%PDF- %PDF-
Direktori : /proc/self/root/var/log/ |
Current File : //proc/self/root/var/log/secure-20230115 |
Jan 8 03:46:14 host sshd[26878]: Did not receive identification string from 165.232.69.156 port 41960 Jan 8 03:46:15 host sshd[26881]: Invalid user oracle from 165.232.69.156 port 43000 Jan 8 03:46:15 host sshd[26879]: Invalid user discord from 165.232.69.156 port 42918 Jan 8 03:46:15 host sshd[26881]: input_userauth_request: invalid user oracle [preauth] Jan 8 03:46:15 host sshd[26879]: input_userauth_request: invalid user discord [preauth] Jan 8 03:46:15 host sshd[26880]: Invalid user admin from 165.232.69.156 port 43042 Jan 8 03:46:15 host sshd[26880]: input_userauth_request: invalid user admin [preauth] Jan 8 03:46:15 host sshd[26884]: User mail from 165.232.69.156 not allowed because not listed in AllowUsers Jan 8 03:46:15 host sshd[26884]: input_userauth_request: invalid user mail [preauth] Jan 8 03:46:15 host sshd[26882]: User centos from 165.232.69.156 not allowed because not listed in AllowUsers Jan 8 03:46:15 host sshd[26882]: input_userauth_request: invalid user centos [preauth] Jan 8 03:46:15 host sshd[26888]: Invalid user test from 165.232.69.156 port 43070 Jan 8 03:46:15 host sshd[26888]: input_userauth_request: invalid user test [preauth] Jan 8 03:46:15 host sshd[26887]: Invalid user user from 165.232.69.156 port 43014 Jan 8 03:46:15 host sshd[26883]: User ftp from 165.232.69.156 not allowed because not listed in AllowUsers Jan 8 03:46:15 host sshd[26883]: input_userauth_request: invalid user ftp [preauth] Jan 8 03:46:15 host sshd[26887]: input_userauth_request: invalid user user [preauth] Jan 8 03:46:15 host sshd[26886]: Invalid user odoo15 from 165.232.69.156 port 43052 Jan 8 03:46:15 host sshd[26886]: input_userauth_request: invalid user odoo15 [preauth] Jan 8 03:46:15 host sshd[26889]: Invalid user deploy from 165.232.69.156 port 43066 Jan 8 03:46:15 host sshd[26889]: input_userauth_request: invalid user deploy [preauth] Jan 8 03:46:15 host sshd[26893]: Invalid user guest from 165.232.69.156 port 43032 Jan 8 03:46:15 host sshd[26893]: input_userauth_request: invalid user guest [preauth] Jan 8 03:46:15 host sshd[26885]: User centos from 165.232.69.156 not allowed because not listed in AllowUsers Jan 8 03:46:15 host sshd[26890]: Invalid user git from 165.232.69.156 port 43002 Jan 8 03:46:15 host sshd[26885]: input_userauth_request: invalid user centos [preauth] Jan 8 03:46:15 host sshd[26890]: input_userauth_request: invalid user git [preauth] Jan 8 03:46:15 host sshd[26894]: Invalid user postgres from 165.232.69.156 port 43046 Jan 8 03:46:15 host sshd[26894]: input_userauth_request: invalid user postgres [preauth] Jan 8 03:46:15 host sshd[26891]: Invalid user es from 165.232.69.156 port 43054 Jan 8 03:46:15 host sshd[26896]: Invalid user fa from 165.232.69.156 port 43040 Jan 8 03:46:15 host sshd[26891]: input_userauth_request: invalid user es [preauth] Jan 8 03:46:15 host sshd[26896]: input_userauth_request: invalid user fa [preauth] Jan 8 03:46:15 host sshd[26901]: Invalid user mcserver from 165.232.69.156 port 43034 Jan 8 03:46:15 host sshd[26901]: input_userauth_request: invalid user mcserver [preauth] Jan 8 03:46:15 host sshd[26892]: Invalid user steam from 165.232.69.156 port 43038 Jan 8 03:46:15 host sshd[26892]: input_userauth_request: invalid user steam [preauth] Jan 8 03:46:15 host sshd[26904]: Invalid user ec2-user from 165.232.69.156 port 43044 Jan 8 03:46:15 host sshd[26904]: input_userauth_request: invalid user ec2-user [preauth] Jan 8 03:46:15 host sshd[26900]: Invalid user esuser from 165.232.69.156 port 43068 Jan 8 03:46:15 host sshd[26900]: input_userauth_request: invalid user esuser [preauth] Jan 8 03:46:15 host sshd[26897]: Invalid user emqx from 165.232.69.156 port 43024 Jan 8 03:46:15 host sshd[26903]: Invalid user ubuntu from 165.232.69.156 port 43026 Jan 8 03:46:15 host sshd[26902]: Invalid user git from 165.232.69.156 port 43022 Jan 8 03:46:15 host sshd[26902]: input_userauth_request: invalid user git [preauth] Jan 8 03:46:15 host sshd[26903]: input_userauth_request: invalid user ubuntu [preauth] Jan 8 03:46:15 host sshd[26905]: Invalid user elastic from 165.232.69.156 port 43072 Jan 8 03:46:15 host sshd[26897]: input_userauth_request: invalid user emqx [preauth] Jan 8 03:46:15 host sshd[26905]: input_userauth_request: invalid user elastic [preauth] Jan 8 03:46:15 host sshd[26907]: Invalid user ts3 from 165.232.69.156 port 43062 Jan 8 03:46:15 host sshd[26907]: input_userauth_request: invalid user ts3 [preauth] Jan 8 03:46:15 host sshd[26911]: User centos from 165.232.69.156 not allowed because not listed in AllowUsers Jan 8 03:46:15 host sshd[26911]: input_userauth_request: invalid user centos [preauth] Jan 8 03:46:15 host sshd[26906]: User centos from 165.232.69.156 not allowed because not listed in AllowUsers Jan 8 03:46:15 host sshd[26906]: input_userauth_request: invalid user centos [preauth] Jan 8 03:46:15 host sshd[26908]: User centos from 165.232.69.156 not allowed because not listed in AllowUsers Jan 8 03:46:15 host sshd[26908]: input_userauth_request: invalid user centos [preauth] Jan 8 03:46:15 host sshd[26909]: Invalid user discordbot from 165.232.69.156 port 43004 Jan 8 03:46:15 host sshd[26909]: input_userauth_request: invalid user discordbot [preauth] Jan 8 03:46:15 host sshd[26910]: Invalid user admin from 165.232.69.156 port 43058 Jan 8 03:46:15 host sshd[26910]: input_userauth_request: invalid user admin [preauth] Jan 8 03:46:15 host sshd[26881]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26879]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26880]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26888]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host unix_chkpwd[26946]: password check failed for user (mail) Jan 8 03:46:15 host unix_chkpwd[26947]: password check failed for user (centos) Jan 8 03:46:15 host sshd[26884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=mail Jan 8 03:46:15 host sshd[26884]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail" Jan 8 03:46:15 host sshd[26882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=centos Jan 8 03:46:15 host sshd[26887]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26886]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host unix_chkpwd[26948]: password check failed for user (ftp) Jan 8 03:46:15 host sshd[26883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=ftp Jan 8 03:46:15 host sshd[26883]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 8 03:46:15 host sshd[26889]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26893]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26890]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26894]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host unix_chkpwd[26949]: password check failed for user (centos) Jan 8 03:46:15 host sshd[26885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=centos Jan 8 03:46:15 host sshd[26891]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26896]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26892]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26901]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26904]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26897]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26900]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26903]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26902]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26905]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26907]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host unix_chkpwd[26950]: password check failed for user (centos) Jan 8 03:46:15 host unix_chkpwd[26951]: password check failed for user (centos) Jan 8 03:46:15 host sshd[26911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=centos Jan 8 03:46:15 host sshd[26906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=centos Jan 8 03:46:15 host sshd[26909]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host sshd[26910]: pam_unix(sshd:auth): check pass; user unknown Jan 8 03:46:15 host sshd[26910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 Jan 8 03:46:15 host unix_chkpwd[26952]: password check failed for user (centos) Jan 8 03:46:15 host sshd[26908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.69.156 user=centos Jan 8 03:46:17 host sshd[26881]: Failed password for invalid user oracle from 165.232.69.156 port 43000 ssh2 Jan 8 03:46:17 host sshd[26879]: Failed password for invalid user discord from 165.232.69.156 port 42918 ssh2 Jan 8 03:46:17 host sshd[26880]: Failed password for invalid user admin from 165.232.69.156 port 43042 ssh2 Jan 8 03:46:17 host sshd[26888]: Failed password for invalid user test from 165.232.69.156 port 43070 ssh2 Jan 8 03:46:17 host sshd[26884]: Failed password for invalid user mail from 165.232.69.156 port 43012 ssh2 Jan 8 03:46:17 host sshd[26882]: Failed password for invalid user centos from 165.232.69.156 port 43064 ssh2 Jan 8 03:46:17 host sshd[26887]: Failed password for invalid user user from 165.232.69.156 port 43014 ssh2 Jan 8 03:46:17 host sshd[26886]: Failed password for invalid user odoo15 from 165.232.69.156 port 43052 ssh2 Jan 8 03:46:17 host sshd[26883]: Failed password for invalid user ftp from 165.232.69.156 port 43010 ssh2 Jan 8 03:46:17 host sshd[26889]: Failed password for invalid user deploy from 165.232.69.156 port 43066 ssh2 Jan 8 03:46:17 host sshd[26893]: Failed password for invalid user guest from 165.232.69.156 port 43032 ssh2 Jan 8 03:46:17 host sshd[26890]: Failed password for invalid user git from 165.232.69.156 port 43002 ssh2 Jan 8 03:46:17 host sshd[26894]: Failed password for invalid user postgres from 165.232.69.156 port 43046 ssh2 Jan 8 03:46:17 host sshd[26885]: Failed password for invalid user centos from 165.232.69.156 port 43048 ssh2 Jan 8 03:46:17 host sshd[26891]: Failed password for invalid user es from 165.232.69.156 port 43054 ssh2 Jan 8 03:46:17 host sshd[26896]: Failed password for invalid user fa from 165.232.69.156 port 43040 ssh2 Jan 8 03:46:17 host sshd[26892]: Failed password for invalid user steam from 165.232.69.156 port 43038 ssh2 Jan 8 03:46:17 host sshd[26901]: Failed password for invalid user mcserver from 165.232.69.156 port 43034 ssh2 Jan 8 03:46:17 host sshd[26904]: Failed password for invalid user ec2-user from 165.232.69.156 port 43044 ssh2 Jan 8 03:46:17 host sshd[26897]: Failed password for invalid user emqx from 165.232.69.156 port 43024 ssh2 Jan 8 03:46:17 host sshd[26900]: Failed password for invalid user esuser from 165.232.69.156 port 43068 ssh2 Jan 8 03:46:17 host sshd[26903]: Failed password for invalid user ubuntu from 165.232.69.156 port 43026 ssh2 Jan 8 03:46:17 host sshd[26902]: Failed password for invalid user git from 165.232.69.156 port 43022 ssh2 Jan 8 03:46:17 host sshd[26905]: Failed password for invalid user elastic from 165.232.69.156 port 43072 ssh2 Jan 8 03:46:17 host sshd[26907]: Failed password for invalid user ts3 from 165.232.69.156 port 43062 ssh2 Jan 8 03:46:17 host sshd[26911]: Failed password for invalid user centos from 165.232.69.156 port 43050 ssh2 Jan 8 03:46:17 host sshd[26906]: Failed password for invalid user centos from 165.232.69.156 port 43016 ssh2 Jan 8 03:46:17 host sshd[26909]: Failed password for invalid user discordbot from 165.232.69.156 port 43004 ssh2 Jan 8 03:46:17 host sshd[26910]: Failed password for invalid user admin from 165.232.69.156 port 43058 ssh2 Jan 8 03:46:17 host sshd[26908]: Failed password for invalid user centos from 165.232.69.156 port 43028 ssh2 Jan 8 03:46:17 host sshd[26881]: Connection closed by 165.232.69.156 port 43000 [preauth] Jan 8 03:46:17 host sshd[26880]: Connection closed by 165.232.69.156 port 43042 [preauth] Jan 8 03:46:17 host sshd[26879]: Connection closed by 165.232.69.156 port 42918 [preauth] Jan 8 03:46:17 host sshd[26882]: Connection closed by 165.232.69.156 port 43064 [preauth] Jan 8 03:46:17 host sshd[26884]: Connection closed by 165.232.69.156 port 43012 [preauth] Jan 8 03:46:17 host sshd[26888]: Connection closed by 165.232.69.156 port 43070 [preauth] Jan 8 03:46:17 host sshd[26887]: Connection closed by 165.232.69.156 port 43014 [preauth] Jan 8 03:46:17 host sshd[26886]: Connection closed by 165.232.69.156 port 43052 [preauth] Jan 8 03:46:17 host sshd[26883]: Connection closed by 165.232.69.156 port 43010 [preauth] Jan 8 03:46:17 host sshd[26889]: Connection closed by 165.232.69.156 port 43066 [preauth] Jan 8 03:46:17 host sshd[26893]: Connection closed by 165.232.69.156 port 43032 [preauth] Jan 8 03:46:17 host sshd[26890]: Connection closed by 165.232.69.156 port 43002 [preauth] Jan 8 03:46:17 host sshd[26894]: Connection closed by 165.232.69.156 port 43046 [preauth] Jan 8 03:46:17 host sshd[26885]: Connection closed by 165.232.69.156 port 43048 [preauth] Jan 8 03:46:17 host sshd[26891]: Connection closed by 165.232.69.156 port 43054 [preauth] Jan 8 03:46:17 host sshd[26896]: Connection closed by 165.232.69.156 port 43040 [preauth] Jan 8 03:46:17 host sshd[26892]: Connection closed by 165.232.69.156 port 43038 [preauth] Jan 8 03:46:17 host sshd[26901]: Connection closed by 165.232.69.156 port 43034 [preauth] Jan 8 03:46:17 host sshd[26904]: Connection closed by 165.232.69.156 port 43044 [preauth] Jan 8 03:46:17 host sshd[26900]: Connection closed by 165.232.69.156 port 43068 [preauth] Jan 8 03:46:17 host sshd[26897]: Connection closed by 165.232.69.156 port 43024 [preauth] Jan 8 03:46:17 host sshd[26903]: Connection closed by 165.232.69.156 port 43026 [preauth] Jan 8 03:46:17 host sshd[26902]: Connection closed by 165.232.69.156 port 43022 [preauth] Jan 8 03:46:17 host sshd[26905]: Connection closed by 165.232.69.156 port 43072 [preauth] Jan 8 03:46:17 host sshd[26907]: Connection closed by 165.232.69.156 port 43062 [preauth] Jan 8 03:46:17 host sshd[26909]: Connection closed by 165.232.69.156 port 43004 [preauth] Jan 8 03:46:17 host sshd[26910]: Connection closed by 165.232.69.156 port 43058 [preauth] Jan 8 03:46:17 host sshd[26906]: Connection closed by 165.232.69.156 port 43016 [preauth] Jan 8 03:46:17 host sshd[26911]: Connection closed by 165.232.69.156 port 43050 [preauth] Jan 8 03:46:17 host sshd[26908]: Connection closed by 165.232.69.156 port 43028 [preauth] Jan 8 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=phmetals user-4=kottayamcalldriv user-5=palco123 user-6=gifterman user-7=wwwletsstalkfood user-8=straightcurve user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=wwwkapin user-16=woodpeck user-17=disposeat user-18=remysagr user-19=wwwkmaorg user-20=ugotscom user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 04:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2poOjdUqhMl0s5nk.~ Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2poOjdUqhMl0s5nk.~' Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2poOjdUqhMl0s5nk.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 04:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 04:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 04:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 04:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 04:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 04:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 04:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 04:22:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 04:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 04:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 04:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 04:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 04:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 04:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 04:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 04:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 04:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 04:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 04:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 04:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 04:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 04:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 04:22:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 04:22:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 04:22:23 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 04:22:26 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 04:25:30 host sshd[673]: Did not receive identification string from 167.71.166.243 port 41388 Jan 8 04:27:27 host sshd[878]: Connection closed by 167.71.166.243 port 43584 [preauth] Jan 8 04:46:09 host sshd[3391]: Bad protocol version identification 'ABCDEFGHIJKLMNOPQRSTUVWXYZ9999' from 172.104.131.24 port 33126 Jan 8 05:03:30 host sshd[5974]: Invalid user marvin from 126.77.170.137 port 52944 Jan 8 05:03:30 host sshd[5974]: input_userauth_request: invalid user marvin [preauth] Jan 8 05:03:30 host sshd[5974]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:03:30 host sshd[5974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.77.170.137 Jan 8 05:03:32 host sshd[5974]: Failed password for invalid user marvin from 126.77.170.137 port 52944 ssh2 Jan 8 05:03:32 host sshd[5974]: Received disconnect from 126.77.170.137 port 52944:11: Bye Bye [preauth] Jan 8 05:03:32 host sshd[5974]: Disconnected from 126.77.170.137 port 52944 [preauth] Jan 8 05:04:43 host sshd[6143]: Invalid user eureka from 51.250.28.180 port 38120 Jan 8 05:04:43 host sshd[6143]: input_userauth_request: invalid user eureka [preauth] Jan 8 05:04:43 host sshd[6143]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:04:43 host sshd[6143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.28.180 Jan 8 05:04:46 host sshd[6143]: Failed password for invalid user eureka from 51.250.28.180 port 38120 ssh2 Jan 8 05:04:46 host sshd[6143]: Received disconnect from 51.250.28.180 port 38120:11: Bye Bye [preauth] Jan 8 05:04:46 host sshd[6143]: Disconnected from 51.250.28.180 port 38120 [preauth] Jan 8 05:05:15 host sshd[6205]: Invalid user a4 from 43.134.41.199 port 38810 Jan 8 05:05:15 host sshd[6205]: input_userauth_request: invalid user a4 [preauth] Jan 8 05:05:15 host sshd[6205]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:05:15 host sshd[6205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.41.199 Jan 8 05:05:17 host sshd[6205]: Failed password for invalid user a4 from 43.134.41.199 port 38810 ssh2 Jan 8 05:05:17 host sshd[6205]: Received disconnect from 43.134.41.199 port 38810:11: Bye Bye [preauth] Jan 8 05:05:17 host sshd[6205]: Disconnected from 43.134.41.199 port 38810 [preauth] Jan 8 05:05:42 host sshd[6271]: Invalid user amanda from 70.88.3.29 port 52865 Jan 8 05:05:42 host sshd[6271]: input_userauth_request: invalid user amanda [preauth] Jan 8 05:05:42 host sshd[6271]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:05:42 host sshd[6271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.88.3.29 Jan 8 05:05:44 host sshd[6271]: Failed password for invalid user amanda from 70.88.3.29 port 52865 ssh2 Jan 8 05:05:44 host sshd[6271]: Received disconnect from 70.88.3.29 port 52865:11: Bye Bye [preauth] Jan 8 05:05:44 host sshd[6271]: Disconnected from 70.88.3.29 port 52865 [preauth] Jan 8 05:05:55 host sshd[6294]: Invalid user infinity from 216.172.178.46 port 52920 Jan 8 05:05:55 host sshd[6294]: input_userauth_request: invalid user infinity [preauth] Jan 8 05:05:55 host sshd[6294]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:05:55 host sshd[6294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.172.178.46 Jan 8 05:05:57 host sshd[6294]: Failed password for invalid user infinity from 216.172.178.46 port 52920 ssh2 Jan 8 05:05:58 host sshd[6294]: Received disconnect from 216.172.178.46 port 52920:11: Bye Bye [preauth] Jan 8 05:05:58 host sshd[6294]: Disconnected from 216.172.178.46 port 52920 [preauth] Jan 8 05:06:07 host sshd[6430]: Invalid user wind from 139.59.25.164 port 42084 Jan 8 05:06:07 host sshd[6430]: input_userauth_request: invalid user wind [preauth] Jan 8 05:06:07 host sshd[6430]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:06:07 host sshd[6430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.25.164 Jan 8 05:06:10 host sshd[6430]: Failed password for invalid user wind from 139.59.25.164 port 42084 ssh2 Jan 8 05:06:10 host sshd[6430]: Received disconnect from 139.59.25.164 port 42084:11: Bye Bye [preauth] Jan 8 05:06:10 host sshd[6430]: Disconnected from 139.59.25.164 port 42084 [preauth] Jan 8 05:06:28 host sshd[6457]: Invalid user hex from 179.127.181.235 port 35948 Jan 8 05:06:28 host sshd[6457]: input_userauth_request: invalid user hex [preauth] Jan 8 05:06:28 host sshd[6457]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:06:28 host sshd[6457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.127.181.235 Jan 8 05:06:30 host sshd[6457]: Failed password for invalid user hex from 179.127.181.235 port 35948 ssh2 Jan 8 05:06:30 host sshd[6457]: Received disconnect from 179.127.181.235 port 35948:11: Bye Bye [preauth] Jan 8 05:06:30 host sshd[6457]: Disconnected from 179.127.181.235 port 35948 [preauth] Jan 8 05:07:00 host sshd[6521]: Invalid user infinity from 126.77.170.137 port 37934 Jan 8 05:07:00 host sshd[6521]: input_userauth_request: invalid user infinity [preauth] Jan 8 05:07:00 host sshd[6521]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:07:00 host sshd[6521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.77.170.137 Jan 8 05:07:02 host sshd[6521]: Failed password for invalid user infinity from 126.77.170.137 port 37934 ssh2 Jan 8 05:07:02 host sshd[6521]: Received disconnect from 126.77.170.137 port 37934:11: Bye Bye [preauth] Jan 8 05:07:02 host sshd[6521]: Disconnected from 126.77.170.137 port 37934 [preauth] Jan 8 05:07:04 host sshd[6537]: Invalid user a4 from 193.123.80.226 port 45386 Jan 8 05:07:04 host sshd[6537]: input_userauth_request: invalid user a4 [preauth] Jan 8 05:07:04 host sshd[6537]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:07:04 host sshd[6537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.123.80.226 Jan 8 05:07:06 host sshd[6537]: Failed password for invalid user a4 from 193.123.80.226 port 45386 ssh2 Jan 8 05:07:06 host sshd[6537]: Received disconnect from 193.123.80.226 port 45386:11: Bye Bye [preauth] Jan 8 05:07:06 host sshd[6537]: Disconnected from 193.123.80.226 port 45386 [preauth] Jan 8 05:07:56 host sshd[6626]: Invalid user dump from 126.77.170.137 port 42334 Jan 8 05:07:56 host sshd[6626]: input_userauth_request: invalid user dump [preauth] Jan 8 05:07:56 host sshd[6626]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:07:56 host sshd[6626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.77.170.137 Jan 8 05:07:58 host sshd[6626]: Failed password for invalid user dump from 126.77.170.137 port 42334 ssh2 Jan 8 05:08:06 host sshd[6684]: Invalid user young from 216.172.178.46 port 60158 Jan 8 05:08:06 host sshd[6684]: input_userauth_request: invalid user young [preauth] Jan 8 05:08:06 host sshd[6684]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:08:06 host sshd[6684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.172.178.46 Jan 8 05:08:09 host sshd[6684]: Failed password for invalid user young from 216.172.178.46 port 60158 ssh2 Jan 8 05:08:09 host sshd[6684]: Received disconnect from 216.172.178.46 port 60158:11: Bye Bye [preauth] Jan 8 05:08:09 host sshd[6684]: Disconnected from 216.172.178.46 port 60158 [preauth] Jan 8 05:09:06 host sshd[6784]: Invalid user wireguard from 216.172.178.46 port 56160 Jan 8 05:09:06 host sshd[6784]: input_userauth_request: invalid user wireguard [preauth] Jan 8 05:09:06 host sshd[6784]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:09:06 host sshd[6784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.172.178.46 Jan 8 05:09:08 host sshd[6784]: Failed password for invalid user wireguard from 216.172.178.46 port 56160 ssh2 Jan 8 05:09:22 host sshd[6837]: Invalid user zhangq from 5.2.73.73 port 41338 Jan 8 05:09:22 host sshd[6837]: input_userauth_request: invalid user zhangq [preauth] Jan 8 05:09:22 host sshd[6837]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:09:22 host sshd[6837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.2.73.73 Jan 8 05:09:24 host sshd[6837]: Failed password for invalid user zhangq from 5.2.73.73 port 41338 ssh2 Jan 8 05:09:24 host sshd[6837]: Received disconnect from 5.2.73.73 port 41338:11: Bye Bye [preauth] Jan 8 05:09:24 host sshd[6837]: Disconnected from 5.2.73.73 port 41338 [preauth] Jan 8 05:09:30 host sshd[6870]: Invalid user marvin from 70.88.3.29 port 23073 Jan 8 05:09:30 host sshd[6870]: input_userauth_request: invalid user marvin [preauth] Jan 8 05:09:30 host sshd[6870]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:09:30 host sshd[6870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.88.3.29 Jan 8 05:09:32 host sshd[6870]: Failed password for invalid user marvin from 70.88.3.29 port 23073 ssh2 Jan 8 05:09:32 host sshd[6870]: Received disconnect from 70.88.3.29 port 23073:11: Bye Bye [preauth] Jan 8 05:09:32 host sshd[6870]: Disconnected from 70.88.3.29 port 23073 [preauth] Jan 8 05:09:49 host sshd[6891]: Invalid user administrativo from 187.204.232.102 port 56760 Jan 8 05:09:49 host sshd[6891]: input_userauth_request: invalid user administrativo [preauth] Jan 8 05:09:49 host sshd[6891]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:09:49 host sshd[6891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.204.232.102 Jan 8 05:09:51 host sshd[6891]: Failed password for invalid user administrativo from 187.204.232.102 port 56760 ssh2 Jan 8 05:09:52 host sshd[6891]: Received disconnect from 187.204.232.102 port 56760:11: Bye Bye [preauth] Jan 8 05:09:52 host sshd[6891]: Disconnected from 187.204.232.102 port 56760 [preauth] Jan 8 05:10:14 host sshd[6952]: Invalid user sanga from 139.59.25.164 port 42098 Jan 8 05:10:14 host sshd[6952]: input_userauth_request: invalid user sanga [preauth] Jan 8 05:10:14 host sshd[6952]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:10:14 host sshd[6952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.25.164 Jan 8 05:10:16 host sshd[6952]: Failed password for invalid user sanga from 139.59.25.164 port 42098 ssh2 Jan 8 05:10:16 host sshd[6952]: Received disconnect from 139.59.25.164 port 42098:11: Bye Bye [preauth] Jan 8 05:10:16 host sshd[6952]: Disconnected from 139.59.25.164 port 42098 [preauth] Jan 8 05:10:25 host sshd[6976]: Invalid user yb from 43.134.41.199 port 32896 Jan 8 05:10:25 host sshd[6976]: input_userauth_request: invalid user yb [preauth] Jan 8 05:10:25 host sshd[6976]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:10:25 host sshd[6976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.41.199 Jan 8 05:10:27 host sshd[6976]: Failed password for invalid user yb from 43.134.41.199 port 32896 ssh2 Jan 8 05:10:27 host sshd[6976]: Received disconnect from 43.134.41.199 port 32896:11: Bye Bye [preauth] Jan 8 05:10:27 host sshd[6976]: Disconnected from 43.134.41.199 port 32896 [preauth] Jan 8 05:10:38 host sshd[7010]: Invalid user watanabe from 5.2.73.73 port 36668 Jan 8 05:10:38 host sshd[7010]: input_userauth_request: invalid user watanabe [preauth] Jan 8 05:10:38 host sshd[7010]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:10:38 host sshd[7010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.2.73.73 Jan 8 05:10:40 host sshd[7010]: Failed password for invalid user watanabe from 5.2.73.73 port 36668 ssh2 Jan 8 05:10:40 host sshd[7010]: Received disconnect from 5.2.73.73 port 36668:11: Bye Bye [preauth] Jan 8 05:10:40 host sshd[7010]: Disconnected from 5.2.73.73 port 36668 [preauth] Jan 8 05:10:42 host sshd[7015]: Invalid user xsl from 70.88.3.29 port 23713 Jan 8 05:10:42 host sshd[7015]: input_userauth_request: invalid user xsl [preauth] Jan 8 05:10:42 host sshd[7015]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:10:42 host sshd[7015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.88.3.29 Jan 8 05:10:43 host sshd[7018]: Invalid user flarum from 179.127.181.235 port 51160 Jan 8 05:10:43 host sshd[7018]: input_userauth_request: invalid user flarum [preauth] Jan 8 05:10:43 host sshd[7018]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:10:43 host sshd[7018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.127.181.235 Jan 8 05:10:44 host sshd[7015]: Failed password for invalid user xsl from 70.88.3.29 port 23713 ssh2 Jan 8 05:10:45 host sshd[7018]: Failed password for invalid user flarum from 179.127.181.235 port 51160 ssh2 Jan 8 05:10:46 host sshd[7018]: Received disconnect from 179.127.181.235 port 51160:11: Bye Bye [preauth] Jan 8 05:10:46 host sshd[7018]: Disconnected from 179.127.181.235 port 51160 [preauth] Jan 8 05:10:58 host sshd[7065]: Invalid user hex from 193.123.80.226 port 42480 Jan 8 05:10:58 host sshd[7065]: input_userauth_request: invalid user hex [preauth] Jan 8 05:10:58 host sshd[7065]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:10:58 host sshd[7065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.123.80.226 Jan 8 05:11:00 host sshd[7065]: Failed password for invalid user hex from 193.123.80.226 port 42480 ssh2 Jan 8 05:11:00 host sshd[7065]: Received disconnect from 193.123.80.226 port 42480:11: Bye Bye [preauth] Jan 8 05:11:00 host sshd[7065]: Disconnected from 193.123.80.226 port 42480 [preauth] Jan 8 05:11:17 host sshd[7213]: Invalid user ricardo from 51.250.28.180 port 53906 Jan 8 05:11:17 host sshd[7213]: input_userauth_request: invalid user ricardo [preauth] Jan 8 05:11:17 host sshd[7213]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:11:17 host sshd[7213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.28.180 Jan 8 05:11:19 host sshd[7213]: Failed password for invalid user ricardo from 51.250.28.180 port 53906 ssh2 Jan 8 05:11:19 host sshd[7213]: Received disconnect from 51.250.28.180 port 53906:11: Bye Bye [preauth] Jan 8 05:11:19 host sshd[7213]: Disconnected from 51.250.28.180 port 53906 [preauth] Jan 8 05:11:20 host sshd[7223]: Invalid user teszt from 187.204.232.102 port 52654 Jan 8 05:11:20 host sshd[7223]: input_userauth_request: invalid user teszt [preauth] Jan 8 05:11:20 host sshd[7223]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:11:20 host sshd[7223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.204.232.102 Jan 8 05:11:22 host sshd[7223]: Failed password for invalid user teszt from 187.204.232.102 port 52654 ssh2 Jan 8 05:11:22 host sshd[7223]: Received disconnect from 187.204.232.102 port 52654:11: Bye Bye [preauth] Jan 8 05:11:22 host sshd[7223]: Disconnected from 187.204.232.102 port 52654 [preauth] Jan 8 05:11:41 host sshd[7272]: Invalid user worker from 5.2.73.73 port 59416 Jan 8 05:11:41 host sshd[7272]: input_userauth_request: invalid user worker [preauth] Jan 8 05:11:41 host sshd[7272]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:11:41 host sshd[7272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.2.73.73 Jan 8 05:11:42 host sshd[7272]: Failed password for invalid user worker from 5.2.73.73 port 59416 ssh2 Jan 8 05:11:43 host sshd[7272]: Received disconnect from 5.2.73.73 port 59416:11: Bye Bye [preauth] Jan 8 05:11:43 host sshd[7272]: Disconnected from 5.2.73.73 port 59416 [preauth] Jan 8 05:11:44 host sshd[7306]: Invalid user yms from 139.59.25.164 port 42104 Jan 8 05:11:44 host sshd[7306]: input_userauth_request: invalid user yms [preauth] Jan 8 05:11:44 host sshd[7306]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:11:44 host sshd[7306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.25.164 Jan 8 05:11:46 host sshd[7306]: Failed password for invalid user yms from 139.59.25.164 port 42104 ssh2 Jan 8 05:11:46 host sshd[7306]: Received disconnect from 139.59.25.164 port 42104:11: Bye Bye [preauth] Jan 8 05:11:46 host sshd[7306]: Disconnected from 139.59.25.164 port 42104 [preauth] Jan 8 05:12:19 host sshd[7382]: Invalid user sentinel from 179.127.181.235 port 50320 Jan 8 05:12:19 host sshd[7382]: input_userauth_request: invalid user sentinel [preauth] Jan 8 05:12:19 host sshd[7382]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:12:19 host sshd[7382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.127.181.235 Jan 8 05:12:19 host sshd[7392]: Invalid user hotline from 43.134.41.199 port 60738 Jan 8 05:12:19 host sshd[7392]: input_userauth_request: invalid user hotline [preauth] Jan 8 05:12:19 host sshd[7392]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:12:19 host sshd[7392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.41.199 Jan 8 05:12:21 host sshd[7382]: Failed password for invalid user sentinel from 179.127.181.235 port 50320 ssh2 Jan 8 05:12:21 host sshd[7382]: Received disconnect from 179.127.181.235 port 50320:11: Bye Bye [preauth] Jan 8 05:12:21 host sshd[7382]: Disconnected from 179.127.181.235 port 50320 [preauth] Jan 8 05:12:21 host sshd[7392]: Failed password for invalid user hotline from 43.134.41.199 port 60738 ssh2 Jan 8 05:12:21 host sshd[7392]: Received disconnect from 43.134.41.199 port 60738:11: Bye Bye [preauth] Jan 8 05:12:21 host sshd[7392]: Disconnected from 43.134.41.199 port 60738 [preauth] Jan 8 05:12:33 host sshd[7498]: Invalid user eureka from 187.204.232.102 port 47090 Jan 8 05:12:33 host sshd[7498]: input_userauth_request: invalid user eureka [preauth] Jan 8 05:12:33 host sshd[7498]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:12:33 host sshd[7498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.204.232.102 Jan 8 05:12:34 host sshd[7498]: Failed password for invalid user eureka from 187.204.232.102 port 47090 ssh2 Jan 8 05:12:35 host sshd[7498]: Received disconnect from 187.204.232.102 port 47090:11: Bye Bye [preauth] Jan 8 05:12:35 host sshd[7498]: Disconnected from 187.204.232.102 port 47090 [preauth] Jan 8 05:15:10 host sshd[7863]: Connection closed by 51.250.28.180 port 60306 [preauth] Jan 8 05:17:12 host sshd[8179]: Invalid user fusihao from 193.123.80.226 port 59808 Jan 8 05:17:12 host sshd[8179]: input_userauth_request: invalid user fusihao [preauth] Jan 8 05:17:12 host sshd[8179]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:17:12 host sshd[8179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.123.80.226 Jan 8 05:17:14 host sshd[8179]: Failed password for invalid user fusihao from 193.123.80.226 port 59808 ssh2 Jan 8 05:18:51 host sshd[8377]: Invalid user vadim from 51.250.28.180 port 59736 Jan 8 05:18:51 host sshd[8377]: input_userauth_request: invalid user vadim [preauth] Jan 8 05:18:51 host sshd[8377]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:18:51 host sshd[8377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.28.180 Jan 8 05:18:53 host sshd[8377]: Failed password for invalid user vadim from 51.250.28.180 port 59736 ssh2 Jan 8 05:18:53 host sshd[8377]: Received disconnect from 51.250.28.180 port 59736:11: Bye Bye [preauth] Jan 8 05:18:53 host sshd[8377]: Disconnected from 51.250.28.180 port 59736 [preauth] Jan 8 05:19:42 host sshd[8522]: Invalid user user from 201.175.116.167 port 49398 Jan 8 05:19:42 host sshd[8522]: input_userauth_request: invalid user user [preauth] Jan 8 05:19:42 host sshd[8522]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:19:42 host sshd[8522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.175.116.167 Jan 8 05:19:44 host sshd[8522]: Failed password for invalid user user from 201.175.116.167 port 49398 ssh2 Jan 8 05:19:44 host sshd[8522]: Connection closed by 201.175.116.167 port 49398 [preauth] Jan 8 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwrmswll user-3=wwwresourcehunte user-4=keralaholi user-5=ugotscom user-6=wwwpmcresource user-7=dartsimp user-8=a2zgroup user-9=laundryboniface user-10=cochintaxi user-11=wwwkaretakers user-12=gifterman user-13=palco123 user-14=kottayamcalldriv user-15=phmetals user-16=wwwnexidigital user-17=mrsclean user-18=bonifacegroup user-19=wwwevmhonda user-20=straightcurve user-21=wwwletsstalkfood user-22=vfmassets user-23=wwwtestugo user-24=shalinijames user-25=pmcresources user-26=disposeat user-27=wwwkmaorg user-28=remysagr user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 05:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 05:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 8 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-nuqSBLgzDWLCfq7r.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-nuqSBLgzDWLCfq7r.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-6ABu8KPavoeUpWmB.wp-toolkit-identifier Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-6ABu8KPavoeUpWmB.wp-toolkit-identifier Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LB3q5QCSQMj3fpaQ.~ Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LB3q5QCSQMj3fpaQ.~' Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LB3q5QCSQMj3fpaQ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 05:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 05:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 05:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 05:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 05:22:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 05:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 05:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 05:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 05:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 05:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 05:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 05:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 05:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 05:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 05:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 05:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 05:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 05:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 05:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 05:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 05:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 05:24:42 host sshd[9770]: Did not receive identification string from 117.11.222.2 port 37609 Jan 8 05:32:39 host sshd[10815]: Invalid user zsp from 178.33.6.226 port 58026 Jan 8 05:32:39 host sshd[10815]: input_userauth_request: invalid user zsp [preauth] Jan 8 05:32:39 host sshd[10815]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:32:39 host sshd[10815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.6.226 Jan 8 05:32:42 host sshd[10815]: Failed password for invalid user zsp from 178.33.6.226 port 58026 ssh2 Jan 8 05:32:42 host sshd[10815]: Received disconnect from 178.33.6.226 port 58026:11: Bye Bye [preauth] Jan 8 05:32:42 host sshd[10815]: Disconnected from 178.33.6.226 port 58026 [preauth] Jan 8 05:35:32 host sshd[11238]: Invalid user ba from 194.110.203.109 port 45112 Jan 8 05:35:32 host sshd[11238]: input_userauth_request: invalid user ba [preauth] Jan 8 05:35:32 host sshd[11238]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:35:32 host sshd[11238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 05:35:34 host sshd[11238]: Failed password for invalid user ba from 194.110.203.109 port 45112 ssh2 Jan 8 05:35:37 host sshd[11238]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:35:39 host sshd[11238]: Failed password for invalid user ba from 194.110.203.109 port 45112 ssh2 Jan 8 05:35:42 host sshd[11238]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:35:44 host sshd[11238]: Failed password for invalid user ba from 194.110.203.109 port 45112 ssh2 Jan 8 05:35:47 host sshd[11238]: Connection closed by 194.110.203.109 port 45112 [preauth] Jan 8 05:35:47 host sshd[11238]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 05:37:13 host sshd[11415]: Invalid user ejbca from 178.33.6.226 port 51216 Jan 8 05:37:13 host sshd[11415]: input_userauth_request: invalid user ejbca [preauth] Jan 8 05:37:13 host sshd[11415]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:37:13 host sshd[11415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.6.226 Jan 8 05:37:15 host sshd[11415]: Failed password for invalid user ejbca from 178.33.6.226 port 51216 ssh2 Jan 8 05:37:16 host sshd[11415]: Received disconnect from 178.33.6.226 port 51216:11: Bye Bye [preauth] Jan 8 05:37:16 host sshd[11415]: Disconnected from 178.33.6.226 port 51216 [preauth] Jan 8 05:38:50 host sshd[11715]: Invalid user andrew from 209.141.56.48 port 57636 Jan 8 05:38:50 host sshd[11715]: input_userauth_request: invalid user andrew [preauth] Jan 8 05:38:50 host sshd[11715]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:38:50 host sshd[11715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 8 05:38:50 host sshd[11710]: Invalid user uwe from 178.33.6.226 port 40756 Jan 8 05:38:50 host sshd[11710]: input_userauth_request: invalid user uwe [preauth] Jan 8 05:38:50 host sshd[11710]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:38:50 host sshd[11710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.6.226 Jan 8 05:38:52 host sshd[11715]: Failed password for invalid user andrew from 209.141.56.48 port 57636 ssh2 Jan 8 05:38:52 host sshd[11715]: Connection closed by 209.141.56.48 port 57636 [preauth] Jan 8 05:38:52 host sshd[11710]: Failed password for invalid user uwe from 178.33.6.226 port 40756 ssh2 Jan 8 05:38:53 host sshd[11710]: Received disconnect from 178.33.6.226 port 40756:11: Bye Bye [preauth] Jan 8 05:38:53 host sshd[11710]: Disconnected from 178.33.6.226 port 40756 [preauth] Jan 8 05:42:51 host sshd[12214]: Invalid user andrew from 209.141.56.48 port 42962 Jan 8 05:42:51 host sshd[12214]: input_userauth_request: invalid user andrew [preauth] Jan 8 05:42:51 host sshd[12214]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:42:51 host sshd[12214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 8 05:42:53 host sshd[12214]: Failed password for invalid user andrew from 209.141.56.48 port 42962 ssh2 Jan 8 05:42:53 host sshd[12214]: Connection closed by 209.141.56.48 port 42962 [preauth] Jan 8 05:49:50 host sshd[13078]: Invalid user bruce from 107.189.30.59 port 48420 Jan 8 05:49:50 host sshd[13078]: input_userauth_request: invalid user bruce [preauth] Jan 8 05:49:50 host sshd[13078]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:49:50 host sshd[13078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 8 05:49:52 host sshd[13078]: Failed password for invalid user bruce from 107.189.30.59 port 48420 ssh2 Jan 8 05:49:53 host sshd[13078]: Connection closed by 107.189.30.59 port 48420 [preauth] Jan 8 05:57:23 host sshd[14169]: Invalid user share from 89.189.188.33 port 43748 Jan 8 05:57:23 host sshd[14169]: input_userauth_request: invalid user share [preauth] Jan 8 05:57:23 host sshd[14169]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:57:23 host sshd[14169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.189.188.33 Jan 8 05:57:25 host sshd[14169]: Failed password for invalid user share from 89.189.188.33 port 43748 ssh2 Jan 8 05:57:25 host sshd[14169]: Received disconnect from 89.189.188.33 port 43748:11: Bye Bye [preauth] Jan 8 05:57:25 host sshd[14169]: Disconnected from 89.189.188.33 port 43748 [preauth] Jan 8 05:58:21 host sshd[14287]: Invalid user zanni from 139.59.186.183 port 46604 Jan 8 05:58:21 host sshd[14287]: input_userauth_request: invalid user zanni [preauth] Jan 8 05:58:21 host sshd[14287]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:58:21 host sshd[14287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.186.183 Jan 8 05:58:23 host sshd[14287]: Failed password for invalid user zanni from 139.59.186.183 port 46604 ssh2 Jan 8 05:58:24 host sshd[14287]: Received disconnect from 139.59.186.183 port 46604:11: Bye Bye [preauth] Jan 8 05:58:24 host sshd[14287]: Disconnected from 139.59.186.183 port 46604 [preauth] Jan 8 05:59:23 host sshd[14398]: Invalid user admin from 219.162.135.47 port 56393 Jan 8 05:59:23 host sshd[14398]: input_userauth_request: invalid user admin [preauth] Jan 8 05:59:23 host sshd[14398]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:59:23 host sshd[14398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.162.135.47 Jan 8 05:59:25 host sshd[14398]: Failed password for invalid user admin from 219.162.135.47 port 56393 ssh2 Jan 8 05:59:26 host sshd[14398]: Connection closed by 219.162.135.47 port 56393 [preauth] Jan 8 05:59:38 host sshd[14435]: Invalid user dragon from 41.66.220.84 port 44966 Jan 8 05:59:38 host sshd[14435]: input_userauth_request: invalid user dragon [preauth] Jan 8 05:59:38 host sshd[14435]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:59:38 host sshd[14435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.220.84 Jan 8 05:59:40 host sshd[14435]: Failed password for invalid user dragon from 41.66.220.84 port 44966 ssh2 Jan 8 05:59:40 host sshd[14435]: Received disconnect from 41.66.220.84 port 44966:11: Bye Bye [preauth] Jan 8 05:59:40 host sshd[14435]: Disconnected from 41.66.220.84 port 44966 [preauth] Jan 8 05:59:57 host sshd[14457]: Invalid user patrick from 191.250.175.219 port 35948 Jan 8 05:59:57 host sshd[14457]: input_userauth_request: invalid user patrick [preauth] Jan 8 05:59:57 host sshd[14457]: pam_unix(sshd:auth): check pass; user unknown Jan 8 05:59:57 host sshd[14457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.250.175.219 Jan 8 05:59:59 host sshd[14457]: Failed password for invalid user patrick from 191.250.175.219 port 35948 ssh2 Jan 8 06:00:00 host sshd[14457]: Received disconnect from 191.250.175.219 port 35948:11: Bye Bye [preauth] Jan 8 06:00:00 host sshd[14457]: Disconnected from 191.250.175.219 port 35948 [preauth] Jan 8 06:01:15 host sshd[14645]: Invalid user erick from 103.179.74.2 port 33890 Jan 8 06:01:15 host sshd[14645]: input_userauth_request: invalid user erick [preauth] Jan 8 06:01:15 host sshd[14645]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:01:15 host sshd[14645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.74.2 Jan 8 06:01:17 host sshd[14645]: Failed password for invalid user erick from 103.179.74.2 port 33890 ssh2 Jan 8 06:01:17 host sshd[14645]: Received disconnect from 103.179.74.2 port 33890:11: Bye Bye [preauth] Jan 8 06:01:17 host sshd[14645]: Disconnected from 103.179.74.2 port 33890 [preauth] Jan 8 06:02:27 host sshd[14796]: Invalid user vte from 13.70.39.68 port 34162 Jan 8 06:02:27 host sshd[14796]: input_userauth_request: invalid user vte [preauth] Jan 8 06:02:27 host sshd[14796]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:02:27 host sshd[14796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.70.39.68 Jan 8 06:02:29 host sshd[14796]: Failed password for invalid user vte from 13.70.39.68 port 34162 ssh2 Jan 8 06:02:29 host sshd[14796]: Received disconnect from 13.70.39.68 port 34162:11: Bye Bye [preauth] Jan 8 06:02:29 host sshd[14796]: Disconnected from 13.70.39.68 port 34162 [preauth] Jan 8 06:03:14 host sshd[14859]: Invalid user segreteria from 139.59.186.183 port 43462 Jan 8 06:03:14 host sshd[14859]: input_userauth_request: invalid user segreteria [preauth] Jan 8 06:03:14 host sshd[14859]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:03:14 host sshd[14859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.186.183 Jan 8 06:03:16 host sshd[14859]: Failed password for invalid user segreteria from 139.59.186.183 port 43462 ssh2 Jan 8 06:03:16 host sshd[14859]: Received disconnect from 139.59.186.183 port 43462:11: Bye Bye [preauth] Jan 8 06:03:16 host sshd[14859]: Disconnected from 139.59.186.183 port 43462 [preauth] Jan 8 06:03:49 host sshd[14919]: Invalid user tiewenbin from 41.66.220.84 port 53024 Jan 8 06:03:49 host sshd[14919]: input_userauth_request: invalid user tiewenbin [preauth] Jan 8 06:03:49 host sshd[14919]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:03:49 host sshd[14919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.220.84 Jan 8 06:03:52 host sshd[14919]: Failed password for invalid user tiewenbin from 41.66.220.84 port 53024 ssh2 Jan 8 06:03:52 host sshd[14919]: Received disconnect from 41.66.220.84 port 53024:11: Bye Bye [preauth] Jan 8 06:03:52 host sshd[14919]: Disconnected from 41.66.220.84 port 53024 [preauth] Jan 8 06:04:13 host sshd[14954]: Invalid user linuxacademy from 89.189.188.33 port 38758 Jan 8 06:04:13 host sshd[14954]: input_userauth_request: invalid user linuxacademy [preauth] Jan 8 06:04:13 host sshd[14954]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:04:13 host sshd[14954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.189.188.33 Jan 8 06:04:15 host sshd[14954]: Failed password for invalid user linuxacademy from 89.189.188.33 port 38758 ssh2 Jan 8 06:04:16 host sshd[14954]: Received disconnect from 89.189.188.33 port 38758:11: Bye Bye [preauth] Jan 8 06:04:16 host sshd[14954]: Disconnected from 89.189.188.33 port 38758 [preauth] Jan 8 06:04:21 host sshd[14969]: Invalid user raph from 139.59.186.183 port 42638 Jan 8 06:04:21 host sshd[14969]: input_userauth_request: invalid user raph [preauth] Jan 8 06:04:21 host sshd[14969]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:04:21 host sshd[14969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.186.183 Jan 8 06:04:22 host sshd[14972]: Invalid user ubuntu2 from 159.89.166.15 port 56118 Jan 8 06:04:22 host sshd[14972]: input_userauth_request: invalid user ubuntu2 [preauth] Jan 8 06:04:22 host sshd[14972]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:04:22 host sshd[14972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.166.15 Jan 8 06:04:24 host sshd[14969]: Failed password for invalid user raph from 139.59.186.183 port 42638 ssh2 Jan 8 06:04:24 host sshd[14972]: Failed password for invalid user ubuntu2 from 159.89.166.15 port 56118 ssh2 Jan 8 06:04:24 host sshd[14972]: Received disconnect from 159.89.166.15 port 56118:11: Bye Bye [preauth] Jan 8 06:04:24 host sshd[14972]: Disconnected from 159.89.166.15 port 56118 [preauth] Jan 8 06:04:24 host sshd[14969]: Received disconnect from 139.59.186.183 port 42638:11: Bye Bye [preauth] Jan 8 06:04:24 host sshd[14969]: Disconnected from 139.59.186.183 port 42638 [preauth] Jan 8 06:04:33 host sshd[15141]: Invalid user dasusr from 103.179.74.2 port 45476 Jan 8 06:04:33 host sshd[15141]: input_userauth_request: invalid user dasusr [preauth] Jan 8 06:04:33 host sshd[15141]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:04:33 host sshd[15141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.74.2 Jan 8 06:04:35 host sshd[15144]: Invalid user ultrix from 191.250.175.219 port 53780 Jan 8 06:04:35 host sshd[15144]: input_userauth_request: invalid user ultrix [preauth] Jan 8 06:04:35 host sshd[15144]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:04:35 host sshd[15144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.250.175.219 Jan 8 06:04:35 host sshd[15141]: Failed password for invalid user dasusr from 103.179.74.2 port 45476 ssh2 Jan 8 06:04:35 host sshd[15141]: Received disconnect from 103.179.74.2 port 45476:11: Bye Bye [preauth] Jan 8 06:04:35 host sshd[15141]: Disconnected from 103.179.74.2 port 45476 [preauth] Jan 8 06:04:37 host sshd[15144]: Failed password for invalid user ultrix from 191.250.175.219 port 53780 ssh2 Jan 8 06:04:38 host sshd[15144]: Received disconnect from 191.250.175.219 port 53780:11: Bye Bye [preauth] Jan 8 06:04:38 host sshd[15144]: Disconnected from 191.250.175.219 port 53780 [preauth] Jan 8 06:04:47 host sshd[15158]: Invalid user alluxio from 13.70.39.68 port 35950 Jan 8 06:04:47 host sshd[15158]: input_userauth_request: invalid user alluxio [preauth] Jan 8 06:04:47 host sshd[15158]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:04:47 host sshd[15158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.70.39.68 Jan 8 06:04:49 host sshd[15158]: Failed password for invalid user alluxio from 13.70.39.68 port 35950 ssh2 Jan 8 06:04:49 host sshd[15158]: Received disconnect from 13.70.39.68 port 35950:11: Bye Bye [preauth] Jan 8 06:04:49 host sshd[15158]: Disconnected from 13.70.39.68 port 35950 [preauth] Jan 8 06:05:21 host sshd[15230]: Invalid user troy from 41.66.220.84 port 43366 Jan 8 06:05:21 host sshd[15230]: input_userauth_request: invalid user troy [preauth] Jan 8 06:05:21 host sshd[15230]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:05:21 host sshd[15230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.220.84 Jan 8 06:05:24 host sshd[15230]: Failed password for invalid user troy from 41.66.220.84 port 43366 ssh2 Jan 8 06:05:24 host sshd[15230]: Received disconnect from 41.66.220.84 port 43366:11: Bye Bye [preauth] Jan 8 06:05:24 host sshd[15230]: Disconnected from 41.66.220.84 port 43366 [preauth] Jan 8 06:05:28 host sshd[15291]: Invalid user qm from 89.189.188.33 port 55084 Jan 8 06:05:28 host sshd[15291]: input_userauth_request: invalid user qm [preauth] Jan 8 06:05:28 host sshd[15291]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:05:28 host sshd[15291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.189.188.33 Jan 8 06:05:30 host sshd[15291]: Failed password for invalid user qm from 89.189.188.33 port 55084 ssh2 Jan 8 06:05:57 host sshd[15364]: Invalid user sx from 103.179.74.2 port 44700 Jan 8 06:05:57 host sshd[15364]: input_userauth_request: invalid user sx [preauth] Jan 8 06:05:57 host sshd[15364]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:05:57 host sshd[15364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.74.2 Jan 8 06:05:59 host sshd[15364]: Failed password for invalid user sx from 103.179.74.2 port 44700 ssh2 Jan 8 06:05:59 host sshd[15364]: Received disconnect from 103.179.74.2 port 44700:11: Bye Bye [preauth] Jan 8 06:05:59 host sshd[15364]: Disconnected from 103.179.74.2 port 44700 [preauth] Jan 8 06:06:00 host sshd[15387]: Invalid user brainy from 13.70.39.68 port 58862 Jan 8 06:06:00 host sshd[15387]: input_userauth_request: invalid user brainy [preauth] Jan 8 06:06:00 host sshd[15387]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:06:00 host sshd[15387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.70.39.68 Jan 8 06:06:02 host sshd[15387]: Failed password for invalid user brainy from 13.70.39.68 port 58862 ssh2 Jan 8 06:06:02 host sshd[15387]: Received disconnect from 13.70.39.68 port 58862:11: Bye Bye [preauth] Jan 8 06:06:02 host sshd[15387]: Disconnected from 13.70.39.68 port 58862 [preauth] Jan 8 06:06:06 host sshd[15447]: Invalid user exx from 159.89.166.15 port 36600 Jan 8 06:06:06 host sshd[15447]: input_userauth_request: invalid user exx [preauth] Jan 8 06:06:06 host sshd[15447]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:06:06 host sshd[15447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.166.15 Jan 8 06:06:08 host sshd[15447]: Failed password for invalid user exx from 159.89.166.15 port 36600 ssh2 Jan 8 06:06:08 host sshd[15447]: Received disconnect from 159.89.166.15 port 36600:11: Bye Bye [preauth] Jan 8 06:06:08 host sshd[15447]: Disconnected from 159.89.166.15 port 36600 [preauth] Jan 8 06:06:14 host sshd[15454]: Invalid user dhaval from 191.250.175.219 port 53188 Jan 8 06:06:14 host sshd[15454]: input_userauth_request: invalid user dhaval [preauth] Jan 8 06:06:14 host sshd[15454]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:06:14 host sshd[15454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.250.175.219 Jan 8 06:06:16 host sshd[15454]: Failed password for invalid user dhaval from 191.250.175.219 port 53188 ssh2 Jan 8 06:07:27 host sshd[15641]: Invalid user yali from 159.89.166.15 port 45302 Jan 8 06:07:27 host sshd[15641]: input_userauth_request: invalid user yali [preauth] Jan 8 06:07:27 host sshd[15641]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:07:27 host sshd[15641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.166.15 Jan 8 06:07:29 host sshd[15641]: Failed password for invalid user yali from 159.89.166.15 port 45302 ssh2 Jan 8 06:07:29 host sshd[15641]: Received disconnect from 159.89.166.15 port 45302:11: Bye Bye [preauth] Jan 8 06:07:29 host sshd[15641]: Disconnected from 159.89.166.15 port 45302 [preauth] Jan 8 06:08:02 host sshd[15710]: Invalid user service from 194.169.175.102 port 52837 Jan 8 06:08:02 host sshd[15710]: input_userauth_request: invalid user service [preauth] Jan 8 06:08:02 host sshd[15710]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:08:02 host sshd[15710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 Jan 8 06:08:04 host sshd[15710]: Failed password for invalid user service from 194.169.175.102 port 52837 ssh2 Jan 8 06:08:04 host sshd[15710]: Received disconnect from 194.169.175.102 port 52837:11: Client disconnecting normally [preauth] Jan 8 06:08:04 host sshd[15710]: Disconnected from 194.169.175.102 port 52837 [preauth] Jan 8 06:15:00 host sshd[16665]: Connection closed by 172.104.11.51 port 34424 [preauth] Jan 8 06:15:02 host sshd[16687]: Connection closed by 172.104.11.51 port 34436 [preauth] Jan 8 06:15:04 host sshd[16766]: Connection closed by 172.104.11.51 port 34442 [preauth] Jan 8 06:17:22 host sshd[17011]: User root from 69.162.225.202 not allowed because not listed in AllowUsers Jan 8 06:17:22 host sshd[17011]: input_userauth_request: invalid user root [preauth] Jan 8 06:17:22 host unix_chkpwd[17016]: password check failed for user (root) Jan 8 06:17:22 host sshd[17011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.162.225.202 user=root Jan 8 06:17:22 host sshd[17011]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:17:24 host sshd[17011]: Failed password for invalid user root from 69.162.225.202 port 52820 ssh2 Jan 8 06:17:25 host sshd[17011]: Connection closed by 69.162.225.202 port 52820 [preauth] Jan 8 06:19:18 host sshd[17274]: User root from 165.22.180.87 not allowed because not listed in AllowUsers Jan 8 06:19:18 host sshd[17274]: input_userauth_request: invalid user root [preauth] Jan 8 06:19:18 host unix_chkpwd[17277]: password check failed for user (root) Jan 8 06:19:18 host sshd[17274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.180.87 user=root Jan 8 06:19:18 host sshd[17274]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:19:20 host sshd[17274]: Failed password for invalid user root from 165.22.180.87 port 50540 ssh2 Jan 8 06:19:20 host sshd[17274]: Received disconnect from 165.22.180.87 port 50540:11: Bye Bye [preauth] Jan 8 06:19:20 host sshd[17274]: Disconnected from 165.22.180.87 port 50540 [preauth] Jan 8 06:19:39 host sshd[17330]: Invalid user user from 202.169.46.155 port 33578 Jan 8 06:19:39 host sshd[17330]: input_userauth_request: invalid user user [preauth] Jan 8 06:19:39 host sshd[17330]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:19:39 host sshd[17330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.155 Jan 8 06:19:41 host sshd[17330]: Failed password for invalid user user from 202.169.46.155 port 33578 ssh2 Jan 8 06:19:41 host sshd[17330]: Received disconnect from 202.169.46.155 port 33578:11: Bye Bye [preauth] Jan 8 06:19:41 host sshd[17330]: Disconnected from 202.169.46.155 port 33578 [preauth] Jan 8 06:20:13 host sshd[17417]: Invalid user bsnl from 159.89.87.72 port 42772 Jan 8 06:20:13 host sshd[17417]: input_userauth_request: invalid user bsnl [preauth] Jan 8 06:20:13 host sshd[17417]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:20:13 host sshd[17417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.87.72 Jan 8 06:20:15 host sshd[17417]: Failed password for invalid user bsnl from 159.89.87.72 port 42772 ssh2 Jan 8 06:20:15 host sshd[17417]: Received disconnect from 159.89.87.72 port 42772:11: Bye Bye [preauth] Jan 8 06:20:15 host sshd[17417]: Disconnected from 159.89.87.72 port 42772 [preauth] Jan 8 06:20:22 host sshd[17541]: Invalid user licongcong from 117.251.18.98 port 33562 Jan 8 06:20:22 host sshd[17541]: input_userauth_request: invalid user licongcong [preauth] Jan 8 06:20:22 host sshd[17541]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:20:22 host sshd[17541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.251.18.98 Jan 8 06:20:25 host sshd[17541]: Failed password for invalid user licongcong from 117.251.18.98 port 33562 ssh2 Jan 8 06:20:25 host sshd[17541]: Received disconnect from 117.251.18.98 port 33562:11: Bye Bye [preauth] Jan 8 06:20:25 host sshd[17541]: Disconnected from 117.251.18.98 port 33562 [preauth] Jan 8 06:20:55 host sshd[17603]: User root from 51.75.17.210 not allowed because not listed in AllowUsers Jan 8 06:20:55 host sshd[17603]: input_userauth_request: invalid user root [preauth] Jan 8 06:20:55 host unix_chkpwd[17608]: password check failed for user (root) Jan 8 06:20:55 host sshd[17603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.210 user=root Jan 8 06:20:55 host sshd[17603]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:20:57 host sshd[17603]: Failed password for invalid user root from 51.75.17.210 port 34172 ssh2 Jan 8 06:20:58 host sshd[17603]: Received disconnect from 51.75.17.210 port 34172:11: Bye Bye [preauth] Jan 8 06:20:58 host sshd[17603]: Disconnected from 51.75.17.210 port 34172 [preauth] Jan 8 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=shalinijames user-7=wwwtestugo user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=straightcurve user-13=wwwletsstalkfood user-14=kottayamcalldriv user-15=phmetals user-16=palco123 user-17=gifterman user-18=wwwnexidigital user-19=mrsclean user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=keralaholi user-29=wwwresourcehunte user-30=wwwrmswll feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 06:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sTgUeTY55LVqYNyj.~ Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sTgUeTY55LVqYNyj.~' Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sTgUeTY55LVqYNyj.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 06:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 06:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 06:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 06:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 06:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 06:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 06:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 06:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 06:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 06:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 06:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 06:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 06:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 06:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 06:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 06:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 06:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 06:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 06:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 06:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 06:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 06:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 06:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 06:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 06:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 06:22:17 host sshd[17922]: Invalid user wwwroot from 20.205.97.129 port 42282 Jan 8 06:22:17 host sshd[17922]: input_userauth_request: invalid user wwwroot [preauth] Jan 8 06:22:17 host sshd[17922]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:22:17 host sshd[17922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.205.97.129 Jan 8 06:22:19 host sshd[17922]: Failed password for invalid user wwwroot from 20.205.97.129 port 42282 ssh2 Jan 8 06:22:19 host sshd[17922]: Received disconnect from 20.205.97.129 port 42282:11: Bye Bye [preauth] Jan 8 06:22:19 host sshd[17922]: Disconnected from 20.205.97.129 port 42282 [preauth] Jan 8 06:23:22 host sshd[18027]: Invalid user sdco from 128.199.1.85 port 57270 Jan 8 06:23:22 host sshd[18027]: input_userauth_request: invalid user sdco [preauth] Jan 8 06:23:22 host sshd[18027]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:23:22 host sshd[18027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.1.85 Jan 8 06:23:24 host sshd[18027]: Failed password for invalid user sdco from 128.199.1.85 port 57270 ssh2 Jan 8 06:23:24 host sshd[18027]: Received disconnect from 128.199.1.85 port 57270:11: Bye Bye [preauth] Jan 8 06:23:24 host sshd[18027]: Disconnected from 128.199.1.85 port 57270 [preauth] Jan 8 06:23:29 host sshd[18057]: Invalid user lzj from 159.65.147.235 port 49958 Jan 8 06:23:29 host sshd[18057]: input_userauth_request: invalid user lzj [preauth] Jan 8 06:23:29 host sshd[18057]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:23:29 host sshd[18057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.147.235 Jan 8 06:23:31 host sshd[18057]: Failed password for invalid user lzj from 159.65.147.235 port 49958 ssh2 Jan 8 06:23:31 host sshd[18057]: Received disconnect from 159.65.147.235 port 49958:11: Bye Bye [preauth] Jan 8 06:23:31 host sshd[18057]: Disconnected from 159.65.147.235 port 49958 [preauth] Jan 8 06:23:32 host sshd[18061]: User root from 167.172.187.120 not allowed because not listed in AllowUsers Jan 8 06:23:32 host sshd[18061]: input_userauth_request: invalid user root [preauth] Jan 8 06:23:32 host unix_chkpwd[18065]: password check failed for user (root) Jan 8 06:23:32 host sshd[18061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.187.120 user=root Jan 8 06:23:32 host sshd[18061]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:23:35 host sshd[18061]: Failed password for invalid user root from 167.172.187.120 port 58122 ssh2 Jan 8 06:23:35 host sshd[18061]: Received disconnect from 167.172.187.120 port 58122:11: Bye Bye [preauth] Jan 8 06:23:35 host sshd[18061]: Disconnected from 167.172.187.120 port 58122 [preauth] Jan 8 06:24:02 host sshd[18098]: User root from 141.95.225.61 not allowed because not listed in AllowUsers Jan 8 06:24:02 host sshd[18098]: input_userauth_request: invalid user root [preauth] Jan 8 06:24:02 host unix_chkpwd[18110]: password check failed for user (root) Jan 8 06:24:02 host sshd[18098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.95.225.61 user=root Jan 8 06:24:02 host sshd[18098]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:24:04 host sshd[18098]: Failed password for invalid user root from 141.95.225.61 port 60454 ssh2 Jan 8 06:24:04 host sshd[18098]: Received disconnect from 141.95.225.61 port 60454:11: Bye Bye [preauth] Jan 8 06:24:04 host sshd[18098]: Disconnected from 141.95.225.61 port 60454 [preauth] Jan 8 06:24:08 host sshd[18116]: Invalid user sdco from 88.109.182.254 port 33340 Jan 8 06:24:08 host sshd[18116]: input_userauth_request: invalid user sdco [preauth] Jan 8 06:24:08 host sshd[18116]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:24:08 host sshd[18116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.109.182.254 Jan 8 06:24:10 host sshd[18116]: Failed password for invalid user sdco from 88.109.182.254 port 33340 ssh2 Jan 8 06:24:10 host sshd[18116]: Received disconnect from 88.109.182.254 port 33340:11: Bye Bye [preauth] Jan 8 06:24:10 host sshd[18116]: Disconnected from 88.109.182.254 port 33340 [preauth] Jan 8 06:24:28 host sshd[18155]: User root from 164.92.66.116 not allowed because not listed in AllowUsers Jan 8 06:24:28 host sshd[18155]: input_userauth_request: invalid user root [preauth] Jan 8 06:24:28 host unix_chkpwd[18179]: password check failed for user (root) Jan 8 06:24:28 host sshd[18155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.116 user=root Jan 8 06:24:28 host sshd[18155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:24:29 host sshd[18155]: Failed password for invalid user root from 164.92.66.116 port 54166 ssh2 Jan 8 06:24:30 host sshd[18155]: Received disconnect from 164.92.66.116 port 54166:11: Bye Bye [preauth] Jan 8 06:24:30 host sshd[18155]: Disconnected from 164.92.66.116 port 54166 [preauth] Jan 8 06:24:44 host sshd[18200]: Invalid user rex from 68.183.105.14 port 44566 Jan 8 06:24:44 host sshd[18200]: input_userauth_request: invalid user rex [preauth] Jan 8 06:24:44 host sshd[18200]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:24:44 host sshd[18200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.105.14 Jan 8 06:24:46 host sshd[18200]: Failed password for invalid user rex from 68.183.105.14 port 44566 ssh2 Jan 8 06:24:47 host sshd[18200]: Received disconnect from 68.183.105.14 port 44566:11: Bye Bye [preauth] Jan 8 06:24:47 host sshd[18200]: Disconnected from 68.183.105.14 port 44566 [preauth] Jan 8 06:24:53 host sshd[18225]: User root from 165.22.180.87 not allowed because not listed in AllowUsers Jan 8 06:24:53 host sshd[18225]: input_userauth_request: invalid user root [preauth] Jan 8 06:24:53 host unix_chkpwd[18228]: password check failed for user (root) Jan 8 06:24:53 host sshd[18225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.180.87 user=root Jan 8 06:24:53 host sshd[18225]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:24:53 host sshd[18222]: User root from 45.164.39.253 not allowed because not listed in AllowUsers Jan 8 06:24:53 host sshd[18222]: input_userauth_request: invalid user root [preauth] Jan 8 06:24:53 host unix_chkpwd[18229]: password check failed for user (root) Jan 8 06:24:53 host sshd[18222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.164.39.253 user=root Jan 8 06:24:53 host sshd[18222]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:24:55 host sshd[18225]: Failed password for invalid user root from 165.22.180.87 port 53400 ssh2 Jan 8 06:24:55 host sshd[18222]: Failed password for invalid user root from 45.164.39.253 port 49612 ssh2 Jan 8 06:24:55 host sshd[18225]: Received disconnect from 165.22.180.87 port 53400:11: Bye Bye [preauth] Jan 8 06:24:55 host sshd[18225]: Disconnected from 165.22.180.87 port 53400 [preauth] Jan 8 06:24:56 host sshd[18222]: Received disconnect from 45.164.39.253 port 49612:11: Bye Bye [preauth] Jan 8 06:24:56 host sshd[18222]: Disconnected from 45.164.39.253 port 49612 [preauth] Jan 8 06:25:11 host sshd[18322]: Invalid user kiran from 20.52.115.173 port 45214 Jan 8 06:25:11 host sshd[18322]: input_userauth_request: invalid user kiran [preauth] Jan 8 06:25:11 host sshd[18322]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:25:11 host sshd[18322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.52.115.173 Jan 8 06:25:13 host sshd[18322]: Failed password for invalid user kiran from 20.52.115.173 port 45214 ssh2 Jan 8 06:25:13 host sshd[18322]: Received disconnect from 20.52.115.173 port 45214:11: Bye Bye [preauth] Jan 8 06:25:13 host sshd[18322]: Disconnected from 20.52.115.173 port 45214 [preauth] Jan 8 06:25:42 host sshd[18394]: User root from 159.89.87.72 not allowed because not listed in AllowUsers Jan 8 06:25:42 host sshd[18394]: input_userauth_request: invalid user root [preauth] Jan 8 06:25:42 host unix_chkpwd[18397]: password check failed for user (root) Jan 8 06:25:42 host sshd[18394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.87.72 user=root Jan 8 06:25:42 host sshd[18394]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:25:44 host sshd[18394]: Failed password for invalid user root from 159.89.87.72 port 39086 ssh2 Jan 8 06:25:44 host sshd[18394]: Received disconnect from 159.89.87.72 port 39086:11: Bye Bye [preauth] Jan 8 06:25:44 host sshd[18394]: Disconnected from 159.89.87.72 port 39086 [preauth] Jan 8 06:25:45 host sshd[18400]: User root from 20.205.97.129 not allowed because not listed in AllowUsers Jan 8 06:25:45 host sshd[18400]: input_userauth_request: invalid user root [preauth] Jan 8 06:25:45 host unix_chkpwd[18408]: password check failed for user (root) Jan 8 06:25:45 host sshd[18400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.205.97.129 user=root Jan 8 06:25:45 host sshd[18400]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:25:47 host sshd[18400]: Failed password for invalid user root from 20.205.97.129 port 56174 ssh2 Jan 8 06:25:47 host sshd[18400]: Received disconnect from 20.205.97.129 port 56174:11: Bye Bye [preauth] Jan 8 06:25:47 host sshd[18400]: Disconnected from 20.205.97.129 port 56174 [preauth] Jan 8 06:26:04 host sshd[18590]: Invalid user rc from 164.92.66.116 port 55834 Jan 8 06:26:04 host sshd[18590]: input_userauth_request: invalid user rc [preauth] Jan 8 06:26:04 host sshd[18590]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:26:04 host sshd[18590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.66.116 Jan 8 06:26:06 host sshd[18590]: Failed password for invalid user rc from 164.92.66.116 port 55834 ssh2 Jan 8 06:26:06 host sshd[18590]: Received disconnect from 164.92.66.116 port 55834:11: Bye Bye [preauth] Jan 8 06:26:06 host sshd[18590]: Disconnected from 164.92.66.116 port 55834 [preauth] Jan 8 06:26:14 host sshd[18630]: Invalid user guest from 88.109.182.254 port 38582 Jan 8 06:26:14 host sshd[18630]: input_userauth_request: invalid user guest [preauth] Jan 8 06:26:14 host sshd[18630]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:26:14 host sshd[18630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.109.182.254 Jan 8 06:26:16 host sshd[18630]: Failed password for invalid user guest from 88.109.182.254 port 38582 ssh2 Jan 8 06:26:16 host sshd[18630]: Received disconnect from 88.109.182.254 port 38582:11: Bye Bye [preauth] Jan 8 06:26:16 host sshd[18630]: Disconnected from 88.109.182.254 port 38582 [preauth] Jan 8 06:26:17 host sshd[18635]: Invalid user test from 117.251.18.98 port 57580 Jan 8 06:26:17 host sshd[18635]: input_userauth_request: invalid user test [preauth] Jan 8 06:26:17 host sshd[18635]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:26:17 host sshd[18635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.251.18.98 Jan 8 06:26:19 host sshd[18635]: Failed password for invalid user test from 117.251.18.98 port 57580 ssh2 Jan 8 06:26:19 host sshd[18635]: Received disconnect from 117.251.18.98 port 57580:11: Bye Bye [preauth] Jan 8 06:26:19 host sshd[18635]: Disconnected from 117.251.18.98 port 57580 [preauth] Jan 8 06:26:22 host sshd[18647]: User root from 167.172.187.120 not allowed because not listed in AllowUsers Jan 8 06:26:22 host sshd[18647]: input_userauth_request: invalid user root [preauth] Jan 8 06:26:22 host unix_chkpwd[18650]: password check failed for user (root) Jan 8 06:26:22 host sshd[18647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.187.120 user=root Jan 8 06:26:22 host sshd[18647]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:26:24 host sshd[18647]: Failed password for invalid user root from 167.172.187.120 port 35750 ssh2 Jan 8 06:26:24 host sshd[18647]: Received disconnect from 167.172.187.120 port 35750:11: Bye Bye [preauth] Jan 8 06:26:24 host sshd[18647]: Disconnected from 167.172.187.120 port 35750 [preauth] Jan 8 06:26:24 host sshd[18652]: User root from 202.169.46.155 not allowed because not listed in AllowUsers Jan 8 06:26:24 host sshd[18652]: input_userauth_request: invalid user root [preauth] Jan 8 06:26:24 host unix_chkpwd[18654]: password check failed for user (root) Jan 8 06:26:24 host sshd[18652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.155 user=root Jan 8 06:26:24 host sshd[18652]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:26:27 host sshd[18652]: Failed password for invalid user root from 202.169.46.155 port 55876 ssh2 Jan 8 06:26:27 host sshd[18652]: Received disconnect from 202.169.46.155 port 55876:11: Bye Bye [preauth] Jan 8 06:26:27 host sshd[18652]: Disconnected from 202.169.46.155 port 55876 [preauth] Jan 8 06:26:29 host sshd[18709]: Invalid user auditor from 68.183.105.14 port 36178 Jan 8 06:26:29 host sshd[18709]: input_userauth_request: invalid user auditor [preauth] Jan 8 06:26:29 host sshd[18709]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:26:29 host sshd[18709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.105.14 Jan 8 06:26:31 host sshd[18709]: Failed password for invalid user auditor from 68.183.105.14 port 36178 ssh2 Jan 8 06:26:31 host sshd[18709]: Received disconnect from 68.183.105.14 port 36178:11: Bye Bye [preauth] Jan 8 06:26:31 host sshd[18709]: Disconnected from 68.183.105.14 port 36178 [preauth] Jan 8 06:26:36 host sshd[18747]: Invalid user wwwroot from 51.75.17.210 port 55682 Jan 8 06:26:36 host sshd[18747]: input_userauth_request: invalid user wwwroot [preauth] Jan 8 06:26:36 host sshd[18747]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:26:36 host sshd[18747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.210 Jan 8 06:26:38 host sshd[18747]: Failed password for invalid user wwwroot from 51.75.17.210 port 55682 ssh2 Jan 8 06:26:39 host sshd[18747]: Received disconnect from 51.75.17.210 port 55682:11: Bye Bye [preauth] Jan 8 06:26:39 host sshd[18747]: Disconnected from 51.75.17.210 port 55682 [preauth] Jan 8 06:26:44 host sshd[18792]: Invalid user scpuser from 159.65.147.235 port 57236 Jan 8 06:26:44 host sshd[18792]: input_userauth_request: invalid user scpuser [preauth] Jan 8 06:26:44 host sshd[18792]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:26:44 host sshd[18792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.147.235 Jan 8 06:26:46 host sshd[18792]: Failed password for invalid user scpuser from 159.65.147.235 port 57236 ssh2 Jan 8 06:26:46 host sshd[18792]: Received disconnect from 159.65.147.235 port 57236:11: Bye Bye [preauth] Jan 8 06:26:46 host sshd[18792]: Disconnected from 159.65.147.235 port 57236 [preauth] Jan 8 06:26:54 host sshd[18806]: Invalid user licongcong from 45.164.39.253 port 48950 Jan 8 06:26:54 host sshd[18806]: input_userauth_request: invalid user licongcong [preauth] Jan 8 06:26:54 host sshd[18806]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:26:54 host sshd[18806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.164.39.253 Jan 8 06:26:55 host sshd[18806]: Failed password for invalid user licongcong from 45.164.39.253 port 48950 ssh2 Jan 8 06:26:56 host sshd[18806]: Received disconnect from 45.164.39.253 port 48950:11: Bye Bye [preauth] Jan 8 06:26:56 host sshd[18806]: Disconnected from 45.164.39.253 port 48950 [preauth] Jan 8 06:27:25 host sshd[18902]: User root from 88.109.182.254 not allowed because not listed in AllowUsers Jan 8 06:27:25 host sshd[18902]: input_userauth_request: invalid user root [preauth] Jan 8 06:27:25 host unix_chkpwd[18907]: password check failed for user (root) Jan 8 06:27:25 host sshd[18902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.109.182.254 user=root Jan 8 06:27:25 host sshd[18902]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:27:25 host sshd[18904]: User root from 211.37.174.62 not allowed because not listed in AllowUsers Jan 8 06:27:25 host sshd[18904]: input_userauth_request: invalid user root [preauth] Jan 8 06:27:25 host unix_chkpwd[18908]: password check failed for user (root) Jan 8 06:27:25 host sshd[18904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.37.174.62 user=root Jan 8 06:27:25 host sshd[18904]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:27:27 host sshd[18902]: Failed password for invalid user root from 88.109.182.254 port 37844 ssh2 Jan 8 06:27:27 host sshd[18915]: Invalid user admin from 128.199.1.85 port 50858 Jan 8 06:27:27 host sshd[18915]: input_userauth_request: invalid user admin [preauth] Jan 8 06:27:27 host sshd[18915]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:27:27 host sshd[18915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.1.85 Jan 8 06:27:27 host sshd[18904]: Failed password for invalid user root from 211.37.174.62 port 54734 ssh2 Jan 8 06:27:27 host sshd[18904]: Received disconnect from 211.37.174.62 port 54734:11: Bye Bye [preauth] Jan 8 06:27:27 host sshd[18904]: Disconnected from 211.37.174.62 port 54734 [preauth] Jan 8 06:27:28 host sshd[18915]: Failed password for invalid user admin from 128.199.1.85 port 50858 ssh2 Jan 8 06:27:28 host sshd[18915]: Received disconnect from 128.199.1.85 port 50858:11: Bye Bye [preauth] Jan 8 06:27:28 host sshd[18915]: Disconnected from 128.199.1.85 port 50858 [preauth] Jan 8 06:27:29 host sshd[18966]: Invalid user testing from 68.183.105.14 port 40286 Jan 8 06:27:29 host sshd[18966]: input_userauth_request: invalid user testing [preauth] Jan 8 06:27:29 host sshd[18966]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:27:29 host sshd[18966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.105.14 Jan 8 06:27:30 host sshd[18970]: User root from 141.95.225.61 not allowed because not listed in AllowUsers Jan 8 06:27:30 host sshd[18970]: input_userauth_request: invalid user root [preauth] Jan 8 06:27:30 host unix_chkpwd[18983]: password check failed for user (root) Jan 8 06:27:30 host sshd[18970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.95.225.61 user=root Jan 8 06:27:30 host sshd[18970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:27:31 host sshd[18966]: Failed password for invalid user testing from 68.183.105.14 port 40286 ssh2 Jan 8 06:27:32 host sshd[18970]: Failed password for invalid user root from 141.95.225.61 port 47080 ssh2 Jan 8 06:27:32 host sshd[18970]: Received disconnect from 141.95.225.61 port 47080:11: Bye Bye [preauth] Jan 8 06:27:32 host sshd[18970]: Disconnected from 141.95.225.61 port 47080 [preauth] Jan 8 06:28:00 host sshd[19077]: User root from 159.65.147.235 not allowed because not listed in AllowUsers Jan 8 06:28:00 host sshd[19077]: input_userauth_request: invalid user root [preauth] Jan 8 06:28:00 host unix_chkpwd[19079]: password check failed for user (root) Jan 8 06:28:00 host sshd[19077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.147.235 user=root Jan 8 06:28:00 host sshd[19077]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:28:02 host sshd[19077]: Failed password for invalid user root from 159.65.147.235 port 51770 ssh2 Jan 8 06:28:11 host sshd[19142]: User root from 20.52.115.173 not allowed because not listed in AllowUsers Jan 8 06:28:11 host sshd[19142]: input_userauth_request: invalid user root [preauth] Jan 8 06:28:11 host unix_chkpwd[19145]: password check failed for user (root) Jan 8 06:28:11 host sshd[19142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.52.115.173 user=root Jan 8 06:28:11 host sshd[19142]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:28:12 host sshd[19146]: Invalid user user from 117.251.18.98 port 56648 Jan 8 06:28:12 host sshd[19146]: input_userauth_request: invalid user user [preauth] Jan 8 06:28:12 host sshd[19146]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:28:12 host sshd[19146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.251.18.98 Jan 8 06:28:13 host sshd[19142]: Failed password for invalid user root from 20.52.115.173 port 53898 ssh2 Jan 8 06:28:14 host sshd[19142]: Received disconnect from 20.52.115.173 port 53898:11: Bye Bye [preauth] Jan 8 06:28:14 host sshd[19142]: Disconnected from 20.52.115.173 port 53898 [preauth] Jan 8 06:28:14 host sshd[19146]: Failed password for invalid user user from 117.251.18.98 port 56648 ssh2 Jan 8 06:28:14 host sshd[19146]: Received disconnect from 117.251.18.98 port 56648:11: Bye Bye [preauth] Jan 8 06:28:14 host sshd[19146]: Disconnected from 117.251.18.98 port 56648 [preauth] Jan 8 06:28:35 host sshd[19257]: User root from 128.199.1.85 not allowed because not listed in AllowUsers Jan 8 06:28:35 host sshd[19257]: input_userauth_request: invalid user root [preauth] Jan 8 06:28:35 host unix_chkpwd[19260]: password check failed for user (root) Jan 8 06:28:35 host sshd[19257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.1.85 user=root Jan 8 06:28:35 host sshd[19257]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:28:38 host sshd[19257]: Failed password for invalid user root from 128.199.1.85 port 42208 ssh2 Jan 8 06:28:38 host sshd[19257]: Received disconnect from 128.199.1.85 port 42208:11: Bye Bye [preauth] Jan 8 06:28:38 host sshd[19257]: Disconnected from 128.199.1.85 port 42208 [preauth] Jan 8 06:30:19 host sshd[19512]: User root from 211.37.174.62 not allowed because not listed in AllowUsers Jan 8 06:30:19 host sshd[19512]: input_userauth_request: invalid user root [preauth] Jan 8 06:30:19 host unix_chkpwd[19516]: password check failed for user (root) Jan 8 06:30:19 host sshd[19512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.37.174.62 user=root Jan 8 06:30:19 host sshd[19512]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:30:22 host sshd[19512]: Failed password for invalid user root from 211.37.174.62 port 60476 ssh2 Jan 8 06:32:53 host sshd[19932]: Connection closed by 167.94.145.57 port 55592 [preauth] Jan 8 06:34:59 host sshd[20144]: Invalid user tai from 159.65.103.250 port 42984 Jan 8 06:34:59 host sshd[20144]: input_userauth_request: invalid user tai [preauth] Jan 8 06:34:59 host sshd[20144]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:34:59 host sshd[20144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.103.250 Jan 8 06:35:01 host sshd[20144]: Failed password for invalid user tai from 159.65.103.250 port 42984 ssh2 Jan 8 06:35:02 host sshd[20144]: Received disconnect from 159.65.103.250 port 42984:11: Bye Bye [preauth] Jan 8 06:35:02 host sshd[20144]: Disconnected from 159.65.103.250 port 42984 [preauth] Jan 8 06:35:19 host sshd[20215]: Invalid user map from 203.23.199.88 port 27894 Jan 8 06:35:19 host sshd[20215]: input_userauth_request: invalid user map [preauth] Jan 8 06:35:20 host sshd[20215]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:35:20 host sshd[20215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.23.199.88 Jan 8 06:35:22 host sshd[20215]: Failed password for invalid user map from 203.23.199.88 port 27894 ssh2 Jan 8 06:35:22 host sshd[20215]: Received disconnect from 203.23.199.88 port 27894:11: Bye Bye [preauth] Jan 8 06:35:22 host sshd[20215]: Disconnected from 203.23.199.88 port 27894 [preauth] Jan 8 06:35:32 host sshd[20256]: Invalid user ew from 68.183.105.114 port 37110 Jan 8 06:35:32 host sshd[20256]: input_userauth_request: invalid user ew [preauth] Jan 8 06:35:32 host sshd[20256]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:35:32 host sshd[20256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.105.114 Jan 8 06:35:34 host sshd[20256]: Failed password for invalid user ew from 68.183.105.114 port 37110 ssh2 Jan 8 06:35:34 host sshd[20256]: Received disconnect from 68.183.105.114 port 37110:11: Bye Bye [preauth] Jan 8 06:35:34 host sshd[20256]: Disconnected from 68.183.105.114 port 37110 [preauth] Jan 8 06:36:08 host sshd[20305]: Invalid user support from 111.75.223.17 port 47358 Jan 8 06:36:08 host sshd[20305]: input_userauth_request: invalid user support [preauth] Jan 8 06:36:09 host sshd[20305]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:36:09 host sshd[20305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.75.223.17 Jan 8 06:36:12 host sshd[20305]: Failed password for invalid user support from 111.75.223.17 port 47358 ssh2 Jan 8 06:36:14 host sshd[20305]: Connection closed by 111.75.223.17 port 47358 [preauth] Jan 8 06:36:27 host sshd[20365]: Invalid user elaine from 143.110.176.216 port 42620 Jan 8 06:36:27 host sshd[20365]: input_userauth_request: invalid user elaine [preauth] Jan 8 06:36:27 host sshd[20365]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:36:27 host sshd[20365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.176.216 Jan 8 06:36:30 host sshd[20365]: Failed password for invalid user elaine from 143.110.176.216 port 42620 ssh2 Jan 8 06:36:30 host sshd[20365]: Received disconnect from 143.110.176.216 port 42620:11: Bye Bye [preauth] Jan 8 06:36:30 host sshd[20365]: Disconnected from 143.110.176.216 port 42620 [preauth] Jan 8 06:36:32 host sshd[20385]: Invalid user nora from 138.197.66.68 port 48657 Jan 8 06:36:32 host sshd[20385]: input_userauth_request: invalid user nora [preauth] Jan 8 06:36:32 host sshd[20385]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:36:32 host sshd[20385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68 Jan 8 06:36:35 host sshd[20385]: Failed password for invalid user nora from 138.197.66.68 port 48657 ssh2 Jan 8 06:36:35 host sshd[20385]: Received disconnect from 138.197.66.68 port 48657:11: Bye Bye [preauth] Jan 8 06:36:35 host sshd[20385]: Disconnected from 138.197.66.68 port 48657 [preauth] Jan 8 06:36:39 host sshd[20393]: Invalid user psono from 94.179.133.22 port 28225 Jan 8 06:36:39 host sshd[20393]: input_userauth_request: invalid user psono [preauth] Jan 8 06:36:39 host sshd[20393]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:36:39 host sshd[20393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.179.133.22 Jan 8 06:36:41 host sshd[20393]: Failed password for invalid user psono from 94.179.133.22 port 28225 ssh2 Jan 8 06:36:41 host sshd[20393]: Received disconnect from 94.179.133.22 port 28225:11: Bye Bye [preauth] Jan 8 06:36:41 host sshd[20393]: Disconnected from 94.179.133.22 port 28225 [preauth] Jan 8 06:36:55 host sshd[20487]: User root from 146.190.127.140 not allowed because not listed in AllowUsers Jan 8 06:36:55 host sshd[20487]: input_userauth_request: invalid user root [preauth] Jan 8 06:36:55 host unix_chkpwd[20524]: password check failed for user (root) Jan 8 06:36:55 host sshd[20487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.127.140 user=root Jan 8 06:36:55 host sshd[20487]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:36:58 host sshd[20487]: Failed password for invalid user root from 146.190.127.140 port 37030 ssh2 Jan 8 06:36:58 host sshd[20487]: Received disconnect from 146.190.127.140 port 37030:11: Bye Bye [preauth] Jan 8 06:36:58 host sshd[20487]: Disconnected from 146.190.127.140 port 37030 [preauth] Jan 8 06:37:21 host sshd[20580]: Invalid user tai from 64.225.70.42 port 51962 Jan 8 06:37:21 host sshd[20580]: input_userauth_request: invalid user tai [preauth] Jan 8 06:37:21 host sshd[20580]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:37:21 host sshd[20580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.70.42 Jan 8 06:37:23 host sshd[20580]: Failed password for invalid user tai from 64.225.70.42 port 51962 ssh2 Jan 8 06:37:23 host sshd[20580]: Received disconnect from 64.225.70.42 port 51962:11: Bye Bye [preauth] Jan 8 06:37:23 host sshd[20580]: Disconnected from 64.225.70.42 port 51962 [preauth] Jan 8 06:37:49 host sshd[20652]: Invalid user userx from 157.230.107.204 port 60606 Jan 8 06:37:49 host sshd[20652]: input_userauth_request: invalid user userx [preauth] Jan 8 06:37:49 host sshd[20652]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:37:49 host sshd[20652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.107.204 Jan 8 06:37:51 host sshd[20652]: Failed password for invalid user userx from 157.230.107.204 port 60606 ssh2 Jan 8 06:37:51 host sshd[20652]: Received disconnect from 157.230.107.204 port 60606:11: Bye Bye [preauth] Jan 8 06:37:51 host sshd[20652]: Disconnected from 157.230.107.204 port 60606 [preauth] Jan 8 06:38:06 host sshd[20697]: Invalid user daniele from 167.71.86.3 port 45484 Jan 8 06:38:06 host sshd[20697]: input_userauth_request: invalid user daniele [preauth] Jan 8 06:38:06 host sshd[20697]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:38:06 host sshd[20697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.86.3 Jan 8 06:38:08 host sshd[20697]: Failed password for invalid user daniele from 167.71.86.3 port 45484 ssh2 Jan 8 06:38:09 host sshd[20697]: Received disconnect from 167.71.86.3 port 45484:11: Bye Bye [preauth] Jan 8 06:38:09 host sshd[20697]: Disconnected from 167.71.86.3 port 45484 [preauth] Jan 8 06:38:24 host sshd[20729]: Invalid user way from 43.153.106.34 port 33082 Jan 8 06:38:24 host sshd[20729]: input_userauth_request: invalid user way [preauth] Jan 8 06:38:24 host sshd[20729]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:38:24 host sshd[20729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.106.34 Jan 8 06:38:26 host sshd[20729]: Failed password for invalid user way from 43.153.106.34 port 33082 ssh2 Jan 8 06:38:26 host sshd[20729]: Received disconnect from 43.153.106.34 port 33082:11: Bye Bye [preauth] Jan 8 06:38:26 host sshd[20729]: Disconnected from 43.153.106.34 port 33082 [preauth] Jan 8 06:40:08 host sshd[20976]: User root from 146.190.127.140 not allowed because not listed in AllowUsers Jan 8 06:40:08 host sshd[20976]: input_userauth_request: invalid user root [preauth] Jan 8 06:40:08 host unix_chkpwd[20979]: password check failed for user (root) Jan 8 06:40:08 host sshd[20976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.127.140 user=root Jan 8 06:40:08 host sshd[20976]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 06:40:10 host sshd[20976]: Failed password for invalid user root from 146.190.127.140 port 38944 ssh2 Jan 8 06:40:10 host sshd[20976]: Received disconnect from 146.190.127.140 port 38944:11: Bye Bye [preauth] Jan 8 06:40:10 host sshd[20976]: Disconnected from 146.190.127.140 port 38944 [preauth] Jan 8 06:40:38 host sshd[21071]: Invalid user thinker from 159.65.103.250 port 45140 Jan 8 06:40:38 host sshd[21071]: input_userauth_request: invalid user thinker [preauth] Jan 8 06:40:38 host sshd[21071]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:40:38 host sshd[21071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.103.250 Jan 8 06:40:40 host sshd[21071]: Failed password for invalid user thinker from 159.65.103.250 port 45140 ssh2 Jan 8 06:40:41 host sshd[21071]: Received disconnect from 159.65.103.250 port 45140:11: Bye Bye [preauth] Jan 8 06:40:41 host sshd[21071]: Disconnected from 159.65.103.250 port 45140 [preauth] Jan 8 06:41:01 host sshd[21130]: Invalid user daniele from 138.197.66.68 port 52699 Jan 8 06:41:01 host sshd[21130]: input_userauth_request: invalid user daniele [preauth] Jan 8 06:41:01 host sshd[21130]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:41:01 host sshd[21130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68 Jan 8 06:41:04 host sshd[21130]: Failed password for invalid user daniele from 138.197.66.68 port 52699 ssh2 Jan 8 06:41:04 host sshd[21130]: Received disconnect from 138.197.66.68 port 52699:11: Bye Bye [preauth] Jan 8 06:41:04 host sshd[21130]: Disconnected from 138.197.66.68 port 52699 [preauth] Jan 8 06:41:17 host sshd[21163]: Invalid user nas from 143.110.176.216 port 37028 Jan 8 06:41:17 host sshd[21163]: input_userauth_request: invalid user nas [preauth] Jan 8 06:41:17 host sshd[21163]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:41:17 host sshd[21163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.176.216 Jan 8 06:41:19 host sshd[21163]: Failed password for invalid user nas from 143.110.176.216 port 37028 ssh2 Jan 8 06:41:19 host sshd[21163]: Received disconnect from 143.110.176.216 port 37028:11: Bye Bye [preauth] Jan 8 06:41:19 host sshd[21163]: Disconnected from 143.110.176.216 port 37028 [preauth] Jan 8 06:41:19 host sshd[21166]: Invalid user xhl from 68.183.105.114 port 33926 Jan 8 06:41:19 host sshd[21166]: input_userauth_request: invalid user xhl [preauth] Jan 8 06:41:19 host sshd[21166]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:41:19 host sshd[21166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.105.114 Jan 8 06:41:21 host sshd[21166]: Failed password for invalid user xhl from 68.183.105.114 port 33926 ssh2 Jan 8 06:41:22 host sshd[21166]: Received disconnect from 68.183.105.114 port 33926:11: Bye Bye [preauth] Jan 8 06:41:22 host sshd[21166]: Disconnected from 68.183.105.114 port 33926 [preauth] Jan 8 06:41:22 host sshd[21175]: Invalid user elaine from 188.235.137.135 port 48966 Jan 8 06:41:22 host sshd[21175]: input_userauth_request: invalid user elaine [preauth] Jan 8 06:41:22 host sshd[21175]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:41:22 host sshd[21175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.137.135 Jan 8 06:41:24 host sshd[21175]: Failed password for invalid user elaine from 188.235.137.135 port 48966 ssh2 Jan 8 06:41:24 host sshd[21175]: Received disconnect from 188.235.137.135 port 48966:11: Bye Bye [preauth] Jan 8 06:41:24 host sshd[21175]: Disconnected from 188.235.137.135 port 48966 [preauth] Jan 8 06:41:31 host sshd[21210]: Invalid user pol from 157.230.107.204 port 38974 Jan 8 06:41:31 host sshd[21210]: input_userauth_request: invalid user pol [preauth] Jan 8 06:41:31 host sshd[21210]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:41:31 host sshd[21210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.107.204 Jan 8 06:41:34 host sshd[21210]: Failed password for invalid user pol from 157.230.107.204 port 38974 ssh2 Jan 8 06:41:34 host sshd[21210]: Received disconnect from 157.230.107.204 port 38974:11: Bye Bye [preauth] Jan 8 06:41:34 host sshd[21210]: Disconnected from 157.230.107.204 port 38974 [preauth] Jan 8 06:41:44 host sshd[21225]: Invalid user ryder from 64.225.70.42 port 60792 Jan 8 06:41:44 host sshd[21225]: input_userauth_request: invalid user ryder [preauth] Jan 8 06:41:44 host sshd[21225]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:41:44 host sshd[21225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.70.42 Jan 8 06:41:45 host sshd[21230]: Invalid user wsk from 203.23.199.88 port 56548 Jan 8 06:41:45 host sshd[21230]: input_userauth_request: invalid user wsk [preauth] Jan 8 06:41:45 host sshd[21230]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:41:45 host sshd[21230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.23.199.88 Jan 8 06:41:46 host sshd[21225]: Failed password for invalid user ryder from 64.225.70.42 port 60792 ssh2 Jan 8 06:41:46 host sshd[21225]: Received disconnect from 64.225.70.42 port 60792:11: Bye Bye [preauth] Jan 8 06:41:46 host sshd[21225]: Disconnected from 64.225.70.42 port 60792 [preauth] Jan 8 06:41:47 host sshd[21230]: Failed password for invalid user wsk from 203.23.199.88 port 56548 ssh2 Jan 8 06:41:48 host sshd[21230]: Received disconnect from 203.23.199.88 port 56548:11: Bye Bye [preauth] Jan 8 06:41:48 host sshd[21230]: Disconnected from 203.23.199.88 port 56548 [preauth] Jan 8 06:41:48 host sshd[21239]: Invalid user userx from 159.65.103.250 port 44474 Jan 8 06:41:48 host sshd[21239]: input_userauth_request: invalid user userx [preauth] Jan 8 06:41:48 host sshd[21239]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:41:48 host sshd[21239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.103.250 Jan 8 06:41:49 host sshd[21242]: Invalid user edu from 94.179.133.22 port 47554 Jan 8 06:41:49 host sshd[21242]: input_userauth_request: invalid user edu [preauth] Jan 8 06:41:49 host sshd[21242]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:41:49 host sshd[21242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.179.133.22 Jan 8 06:41:50 host sshd[21239]: Failed password for invalid user userx from 159.65.103.250 port 44474 ssh2 Jan 8 06:41:51 host sshd[21239]: Received disconnect from 159.65.103.250 port 44474:11: Bye Bye [preauth] Jan 8 06:41:51 host sshd[21239]: Disconnected from 159.65.103.250 port 44474 [preauth] Jan 8 06:41:51 host sshd[21242]: Failed password for invalid user edu from 94.179.133.22 port 47554 ssh2 Jan 8 06:41:51 host sshd[21242]: Received disconnect from 94.179.133.22 port 47554:11: Bye Bye [preauth] Jan 8 06:41:51 host sshd[21242]: Disconnected from 94.179.133.22 port 47554 [preauth] Jan 8 06:42:04 host sshd[21405]: Invalid user wbx from 167.71.86.3 port 42438 Jan 8 06:42:04 host sshd[21405]: input_userauth_request: invalid user wbx [preauth] Jan 8 06:42:04 host sshd[21405]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:42:04 host sshd[21405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.86.3 Jan 8 06:42:06 host sshd[21405]: Failed password for invalid user wbx from 167.71.86.3 port 42438 ssh2 Jan 8 06:42:06 host sshd[21405]: Received disconnect from 167.71.86.3 port 42438:11: Bye Bye [preauth] Jan 8 06:42:06 host sshd[21405]: Disconnected from 167.71.86.3 port 42438 [preauth] Jan 8 06:42:10 host sshd[21412]: Invalid user clarice from 138.197.66.68 port 41995 Jan 8 06:42:10 host sshd[21412]: input_userauth_request: invalid user clarice [preauth] Jan 8 06:42:10 host sshd[21412]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:42:10 host sshd[21412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68 Jan 8 06:42:12 host sshd[21412]: Failed password for invalid user clarice from 138.197.66.68 port 41995 ssh2 Jan 8 06:42:22 host sshd[21453]: Invalid user bernie from 68.183.105.114 port 56290 Jan 8 06:42:22 host sshd[21453]: input_userauth_request: invalid user bernie [preauth] Jan 8 06:42:22 host sshd[21453]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:42:22 host sshd[21453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.105.114 Jan 8 06:42:24 host sshd[21453]: Failed password for invalid user bernie from 68.183.105.114 port 56290 ssh2 Jan 8 06:42:24 host sshd[21453]: Received disconnect from 68.183.105.114 port 56290:11: Bye Bye [preauth] Jan 8 06:42:24 host sshd[21453]: Disconnected from 68.183.105.114 port 56290 [preauth] Jan 8 06:42:41 host sshd[21534]: Invalid user takahashi from 157.230.107.204 port 38694 Jan 8 06:42:41 host sshd[21534]: input_userauth_request: invalid user takahashi [preauth] Jan 8 06:42:41 host sshd[21534]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:42:41 host sshd[21534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.107.204 Jan 8 06:42:43 host sshd[21534]: Failed password for invalid user takahashi from 157.230.107.204 port 38694 ssh2 Jan 8 06:42:43 host sshd[21534]: Received disconnect from 157.230.107.204 port 38694:11: Bye Bye [preauth] Jan 8 06:42:43 host sshd[21534]: Disconnected from 157.230.107.204 port 38694 [preauth] Jan 8 06:42:47 host sshd[21548]: Invalid user ew from 64.225.70.42 port 38648 Jan 8 06:42:47 host sshd[21548]: input_userauth_request: invalid user ew [preauth] Jan 8 06:42:47 host sshd[21548]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:42:47 host sshd[21548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.70.42 Jan 8 06:42:49 host sshd[21548]: Failed password for invalid user ew from 64.225.70.42 port 38648 ssh2 Jan 8 06:42:50 host sshd[21548]: Received disconnect from 64.225.70.42 port 38648:11: Bye Bye [preauth] Jan 8 06:42:50 host sshd[21548]: Disconnected from 64.225.70.42 port 38648 [preauth] Jan 8 06:42:50 host sshd[21579]: Invalid user nas from 43.153.106.34 port 47302 Jan 8 06:42:50 host sshd[21579]: input_userauth_request: invalid user nas [preauth] Jan 8 06:42:50 host sshd[21579]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:42:50 host sshd[21579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.106.34 Jan 8 06:42:53 host sshd[21579]: Failed password for invalid user nas from 43.153.106.34 port 47302 ssh2 Jan 8 06:42:53 host sshd[21579]: Received disconnect from 43.153.106.34 port 47302:11: Bye Bye [preauth] Jan 8 06:42:53 host sshd[21579]: Disconnected from 43.153.106.34 port 47302 [preauth] Jan 8 06:42:54 host sshd[21619]: Invalid user yjx from 143.110.176.216 port 36418 Jan 8 06:42:54 host sshd[21619]: input_userauth_request: invalid user yjx [preauth] Jan 8 06:42:54 host sshd[21619]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:42:54 host sshd[21619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.176.216 Jan 8 06:42:56 host sshd[21619]: Failed password for invalid user yjx from 143.110.176.216 port 36418 ssh2 Jan 8 06:42:57 host sshd[21651]: Invalid user map from 94.179.133.22 port 18337 Jan 8 06:42:57 host sshd[21651]: input_userauth_request: invalid user map [preauth] Jan 8 06:42:57 host sshd[21651]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:42:57 host sshd[21651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.179.133.22 Jan 8 06:42:59 host sshd[21651]: Failed password for invalid user map from 94.179.133.22 port 18337 ssh2 Jan 8 06:42:59 host sshd[21651]: Received disconnect from 94.179.133.22 port 18337:11: Bye Bye [preauth] Jan 8 06:42:59 host sshd[21651]: Disconnected from 94.179.133.22 port 18337 [preauth] Jan 8 06:43:13 host sshd[21714]: Invalid user lauren from 167.71.86.3 port 39926 Jan 8 06:43:13 host sshd[21714]: input_userauth_request: invalid user lauren [preauth] Jan 8 06:43:13 host sshd[21714]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:43:13 host sshd[21714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.86.3 Jan 8 06:43:15 host sshd[21714]: Failed password for invalid user lauren from 167.71.86.3 port 39926 ssh2 Jan 8 06:43:15 host sshd[21714]: Received disconnect from 167.71.86.3 port 39926:11: Bye Bye [preauth] Jan 8 06:43:15 host sshd[21714]: Disconnected from 167.71.86.3 port 39926 [preauth] Jan 8 06:43:30 host sshd[21788]: Invalid user raid from 203.23.199.88 port 6129 Jan 8 06:43:30 host sshd[21788]: input_userauth_request: invalid user raid [preauth] Jan 8 06:43:30 host sshd[21788]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:43:30 host sshd[21788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.23.199.88 Jan 8 06:43:32 host sshd[21788]: Failed password for invalid user raid from 203.23.199.88 port 6129 ssh2 Jan 8 06:44:07 host sshd[21896]: Invalid user coder from 43.153.106.34 port 42444 Jan 8 06:44:07 host sshd[21896]: input_userauth_request: invalid user coder [preauth] Jan 8 06:44:07 host sshd[21896]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:44:07 host sshd[21896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.106.34 Jan 8 06:44:09 host sshd[21896]: Failed password for invalid user coder from 43.153.106.34 port 42444 ssh2 Jan 8 06:44:09 host sshd[21896]: Received disconnect from 43.153.106.34 port 42444:11: Bye Bye [preauth] Jan 8 06:44:09 host sshd[21896]: Disconnected from 43.153.106.34 port 42444 [preauth] Jan 8 06:45:15 host sshd[22146]: Invalid user userx from 188.235.137.135 port 40578 Jan 8 06:45:15 host sshd[22146]: input_userauth_request: invalid user userx [preauth] Jan 8 06:45:15 host sshd[22146]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:45:15 host sshd[22146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.137.135 Jan 8 06:45:17 host sshd[22146]: Failed password for invalid user userx from 188.235.137.135 port 40578 ssh2 Jan 8 06:45:17 host sshd[22146]: Received disconnect from 188.235.137.135 port 40578:11: Bye Bye [preauth] Jan 8 06:45:17 host sshd[22146]: Disconnected from 188.235.137.135 port 40578 [preauth] Jan 8 06:46:47 host sshd[22317]: Invalid user wbx from 188.235.137.135 port 36387 Jan 8 06:46:47 host sshd[22317]: input_userauth_request: invalid user wbx [preauth] Jan 8 06:46:47 host sshd[22317]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:46:47 host sshd[22317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.137.135 Jan 8 06:46:49 host sshd[22317]: Failed password for invalid user wbx from 188.235.137.135 port 36387 ssh2 Jan 8 06:46:49 host sshd[22317]: Received disconnect from 188.235.137.135 port 36387:11: Bye Bye [preauth] Jan 8 06:46:49 host sshd[22317]: Disconnected from 188.235.137.135 port 36387 [preauth] Jan 8 06:54:02 host sshd[23296]: Invalid user andrew from 209.141.56.48 port 38200 Jan 8 06:54:02 host sshd[23296]: input_userauth_request: invalid user andrew [preauth] Jan 8 06:54:02 host sshd[23296]: pam_unix(sshd:auth): check pass; user unknown Jan 8 06:54:02 host sshd[23296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 8 06:54:04 host sshd[23296]: Failed password for invalid user andrew from 209.141.56.48 port 38200 ssh2 Jan 8 06:54:04 host sshd[23296]: Connection closed by 209.141.56.48 port 38200 [preauth] Jan 8 07:19:31 host sshd[27033]: Invalid user andrew from 209.141.56.48 port 37368 Jan 8 07:19:31 host sshd[27033]: input_userauth_request: invalid user andrew [preauth] Jan 8 07:19:31 host sshd[27033]: pam_unix(sshd:auth): check pass; user unknown Jan 8 07:19:31 host sshd[27033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 8 07:19:34 host sshd[27033]: Failed password for invalid user andrew from 209.141.56.48 port 37368 ssh2 Jan 8 07:19:34 host sshd[27033]: Connection closed by 209.141.56.48 port 37368 [preauth] Jan 8 07:21:51 host sshd[27428]: Invalid user andrew from 209.141.56.48 port 40996 Jan 8 07:21:51 host sshd[27428]: input_userauth_request: invalid user andrew [preauth] Jan 8 07:21:51 host sshd[27428]: pam_unix(sshd:auth): check pass; user unknown Jan 8 07:21:51 host sshd[27428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 8 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:54 host sshd[27428]: Failed password for invalid user andrew from 209.141.56.48 port 40996 ssh2 Jan 8 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=gifterman user-4=palco123 user-5=phmetals user-6=kottayamcalldriv user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=woodpeck user-16=wwwkapin user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=wwwrmswll user-21=wwwresourcehunte user-22=keralaholi user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 07:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NZMvK2edtFygprG3.~ Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NZMvK2edtFygprG3.~' Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NZMvK2edtFygprG3.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 07:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 07:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 07:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 07:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 07:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 07:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 07:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 07:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 07:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 07:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 07:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 07:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 07:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 07:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 07:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 07:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 07:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 07:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 07:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 07:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 07:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 07:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 07:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 07:37:32 host sshd[29740]: Invalid user admin from 31.41.244.124 port 56255 Jan 8 07:37:32 host sshd[29740]: input_userauth_request: invalid user admin [preauth] Jan 8 07:37:32 host sshd[29740]: pam_unix(sshd:auth): check pass; user unknown Jan 8 07:37:32 host sshd[29740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 8 07:37:33 host sshd[29743]: Invalid user bb from 194.110.203.109 port 38812 Jan 8 07:37:33 host sshd[29743]: input_userauth_request: invalid user bb [preauth] Jan 8 07:37:33 host sshd[29743]: pam_unix(sshd:auth): check pass; user unknown Jan 8 07:37:33 host sshd[29743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 07:37:34 host sshd[29740]: Failed password for invalid user admin from 31.41.244.124 port 56255 ssh2 Jan 8 07:37:34 host sshd[29740]: Received disconnect from 31.41.244.124 port 56255:11: Client disconnecting normally [preauth] Jan 8 07:37:34 host sshd[29740]: Disconnected from 31.41.244.124 port 56255 [preauth] Jan 8 07:37:35 host sshd[29743]: Failed password for invalid user bb from 194.110.203.109 port 38812 ssh2 Jan 8 07:37:35 host sshd[29749]: Invalid user admin from 31.41.244.124 port 3792 Jan 8 07:37:35 host sshd[29749]: input_userauth_request: invalid user admin [preauth] Jan 8 07:37:36 host sshd[29749]: pam_unix(sshd:auth): check pass; user unknown Jan 8 07:37:36 host sshd[29749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 8 07:37:37 host sshd[29749]: Failed password for invalid user admin from 31.41.244.124 port 3792 ssh2 Jan 8 07:37:37 host sshd[29749]: Received disconnect from 31.41.244.124 port 3792:11: Client disconnecting normally [preauth] Jan 8 07:37:37 host sshd[29749]: Disconnected from 31.41.244.124 port 3792 [preauth] Jan 8 07:37:38 host sshd[29743]: pam_unix(sshd:auth): check pass; user unknown Jan 8 07:37:38 host sshd[29755]: Invalid user admin from 31.41.244.124 port 7520 Jan 8 07:37:38 host sshd[29755]: input_userauth_request: invalid user admin [preauth] Jan 8 07:37:39 host sshd[29755]: pam_unix(sshd:auth): check pass; user unknown Jan 8 07:37:39 host sshd[29755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 8 07:37:40 host sshd[29743]: Failed password for invalid user bb from 194.110.203.109 port 38812 ssh2 Jan 8 07:37:41 host sshd[29755]: Failed password for invalid user admin from 31.41.244.124 port 7520 ssh2 Jan 8 07:37:41 host sshd[29755]: Received disconnect from 31.41.244.124 port 7520:11: Client disconnecting normally [preauth] Jan 8 07:37:41 host sshd[29755]: Disconnected from 31.41.244.124 port 7520 [preauth] Jan 8 07:37:43 host sshd[29743]: pam_unix(sshd:auth): check pass; user unknown Jan 8 07:37:45 host sshd[29743]: Failed password for invalid user bb from 194.110.203.109 port 38812 ssh2 Jan 8 07:37:49 host sshd[29743]: Connection closed by 194.110.203.109 port 38812 [preauth] Jan 8 07:37:49 host sshd[29743]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 08:07:23 host sshd[2387]: Invalid user from 64.62.197.120 port 64497 Jan 8 08:07:23 host sshd[2387]: input_userauth_request: invalid user [preauth] Jan 8 08:07:26 host sshd[2387]: Connection closed by 64.62.197.120 port 64497 [preauth] Jan 8 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=wwwnexidigital user-21=mrsclean user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 08:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ClZjuyoyMJTvOnoz.~ Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ClZjuyoyMJTvOnoz.~' Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ClZjuyoyMJTvOnoz.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 08:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 08:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 08:21:56 host sshd[4437]: Invalid user fk from 37.17.53.26 port 54861 Jan 8 08:21:56 host sshd[4437]: input_userauth_request: invalid user fk [preauth] Jan 8 08:21:56 host sshd[4437]: pam_unix(sshd:auth): check pass; user unknown Jan 8 08:21:56 host sshd[4437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.17.53.26 Jan 8 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:57 host sshd[4437]: Failed password for invalid user fk from 37.17.53.26 port 54861 ssh2 Jan 8 08:21:58 host sshd[4437]: Received disconnect from 37.17.53.26 port 54861:11: Bye Bye [preauth] Jan 8 08:21:58 host sshd[4437]: Disconnected from 37.17.53.26 port 54861 [preauth] Jan 8 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 08:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 08:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 08:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 08:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 08:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 08:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 08:22:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 08:22:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 08:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 08:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 08:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 08:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 08:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 08:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 08:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 08:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 08:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 08:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 08:22:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 08:22:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 08:22:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 08:22:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 08:22:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 08:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 08:22:25 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 08:22:29 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 08:27:37 host sshd[5420]: Invalid user hcicloud from 37.17.53.26 port 37435 Jan 8 08:27:37 host sshd[5420]: input_userauth_request: invalid user hcicloud [preauth] Jan 8 08:27:37 host sshd[5420]: pam_unix(sshd:auth): check pass; user unknown Jan 8 08:27:37 host sshd[5420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.17.53.26 Jan 8 08:27:39 host sshd[5420]: Failed password for invalid user hcicloud from 37.17.53.26 port 37435 ssh2 Jan 8 08:27:39 host sshd[5420]: Received disconnect from 37.17.53.26 port 37435:11: Bye Bye [preauth] Jan 8 08:27:39 host sshd[5420]: Disconnected from 37.17.53.26 port 37435 [preauth] Jan 8 08:28:16 host sshd[5459]: Connection closed by 167.94.138.62 port 33144 [preauth] Jan 8 08:29:10 host sshd[5617]: Invalid user arodriguez from 37.17.53.26 port 36430 Jan 8 08:29:10 host sshd[5617]: input_userauth_request: invalid user arodriguez [preauth] Jan 8 08:29:10 host sshd[5617]: pam_unix(sshd:auth): check pass; user unknown Jan 8 08:29:10 host sshd[5617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.17.53.26 Jan 8 08:29:13 host sshd[5617]: Failed password for invalid user arodriguez from 37.17.53.26 port 36430 ssh2 Jan 8 08:29:13 host sshd[5617]: Received disconnect from 37.17.53.26 port 36430:11: Bye Bye [preauth] Jan 8 08:29:13 host sshd[5617]: Disconnected from 37.17.53.26 port 36430 [preauth] Jan 8 08:39:45 host sshd[7478]: Invalid user admin from 141.98.11.106 port 51992 Jan 8 08:39:45 host sshd[7478]: input_userauth_request: invalid user admin [preauth] Jan 8 08:39:45 host sshd[7478]: pam_unix(sshd:auth): check pass; user unknown Jan 8 08:39:45 host sshd[7478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.106 Jan 8 08:39:46 host sshd[7478]: Failed password for invalid user admin from 141.98.11.106 port 51992 ssh2 Jan 8 08:39:47 host sshd[7478]: Received disconnect from 141.98.11.106 port 51992:11: Normal Shutdown, Thank you for playing [preauth] Jan 8 08:39:47 host sshd[7478]: Disconnected from 141.98.11.106 port 51992 [preauth] Jan 8 08:40:21 host sshd[7573]: Invalid user admin from 141.98.11.106 port 33738 Jan 8 08:40:21 host sshd[7573]: input_userauth_request: invalid user admin [preauth] Jan 8 08:40:21 host sshd[7573]: pam_unix(sshd:auth): check pass; user unknown Jan 8 08:40:21 host sshd[7573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.106 Jan 8 08:40:23 host sshd[7573]: Failed password for invalid user admin from 141.98.11.106 port 33738 ssh2 Jan 8 08:40:24 host sshd[7573]: Received disconnect from 141.98.11.106 port 33738:11: Normal Shutdown, Thank you for playing [preauth] Jan 8 08:40:24 host sshd[7573]: Disconnected from 141.98.11.106 port 33738 [preauth] Jan 8 08:40:53 host sshd[7746]: Invalid user yangtingwei from 175.170.149.29 port 25980 Jan 8 08:40:53 host sshd[7746]: input_userauth_request: invalid user yangtingwei [preauth] Jan 8 08:40:53 host sshd[7746]: pam_unix(sshd:auth): check pass; user unknown Jan 8 08:40:53 host sshd[7746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.170.149.29 Jan 8 08:40:55 host sshd[7746]: Failed password for invalid user yangtingwei from 175.170.149.29 port 25980 ssh2 Jan 8 08:40:55 host sshd[7746]: Received disconnect from 175.170.149.29 port 25980:11: Bye Bye [preauth] Jan 8 08:40:55 host sshd[7746]: Disconnected from 175.170.149.29 port 25980 [preauth] Jan 8 08:40:58 host sshd[7758]: Invalid user student from 141.98.11.106 port 43710 Jan 8 08:40:58 host sshd[7758]: input_userauth_request: invalid user student [preauth] Jan 8 08:40:58 host sshd[7758]: pam_unix(sshd:auth): check pass; user unknown Jan 8 08:40:58 host sshd[7758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.106 Jan 8 08:41:00 host sshd[7758]: Failed password for invalid user student from 141.98.11.106 port 43710 ssh2 Jan 8 08:41:00 host sshd[7758]: Received disconnect from 141.98.11.106 port 43710:11: Normal Shutdown, Thank you for playing [preauth] Jan 8 08:41:00 host sshd[7758]: Disconnected from 141.98.11.106 port 43710 [preauth] Jan 8 08:52:50 host sshd[9602]: Invalid user kawamoto from 175.170.149.29 port 30676 Jan 8 08:52:50 host sshd[9602]: input_userauth_request: invalid user kawamoto [preauth] Jan 8 08:52:50 host sshd[9602]: pam_unix(sshd:auth): check pass; user unknown Jan 8 08:52:50 host sshd[9602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.170.149.29 Jan 8 08:52:52 host sshd[9602]: Failed password for invalid user kawamoto from 175.170.149.29 port 30676 ssh2 Jan 8 08:52:52 host sshd[9602]: Received disconnect from 175.170.149.29 port 30676:11: Bye Bye [preauth] Jan 8 08:52:52 host sshd[9602]: Disconnected from 175.170.149.29 port 30676 [preauth] Jan 8 08:54:13 host sshd[9764]: Invalid user lhr from 175.170.149.29 port 41008 Jan 8 08:54:13 host sshd[9764]: input_userauth_request: invalid user lhr [preauth] Jan 8 08:54:13 host sshd[9764]: pam_unix(sshd:auth): check pass; user unknown Jan 8 08:54:13 host sshd[9764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.170.149.29 Jan 8 08:54:14 host sshd[9764]: Failed password for invalid user lhr from 175.170.149.29 port 41008 ssh2 Jan 8 08:54:15 host sshd[9764]: Received disconnect from 175.170.149.29 port 41008:11: Bye Bye [preauth] Jan 8 08:54:15 host sshd[9764]: Disconnected from 175.170.149.29 port 41008 [preauth] Jan 8 09:09:03 host sshd[11925]: Connection closed by 167.248.133.120 port 59514 [preauth] Jan 8 09:15:18 host sshd[12816]: Invalid user ppp from 181.129.165.99 port 33134 Jan 8 09:15:18 host sshd[12816]: input_userauth_request: invalid user ppp [preauth] Jan 8 09:15:18 host sshd[12816]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:15:18 host sshd[12816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.165.99 Jan 8 09:15:20 host sshd[12816]: Failed password for invalid user ppp from 181.129.165.99 port 33134 ssh2 Jan 8 09:15:20 host sshd[12816]: Received disconnect from 181.129.165.99 port 33134:11: Bye Bye [preauth] Jan 8 09:15:20 host sshd[12816]: Disconnected from 181.129.165.99 port 33134 [preauth] Jan 8 09:16:15 host sshd[12937]: Invalid user sftp from 65.0.89.193 port 38276 Jan 8 09:16:15 host sshd[12937]: input_userauth_request: invalid user sftp [preauth] Jan 8 09:16:15 host sshd[12937]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:16:15 host sshd[12937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.0.89.193 Jan 8 09:16:18 host sshd[12937]: Failed password for invalid user sftp from 65.0.89.193 port 38276 ssh2 Jan 8 09:16:18 host sshd[12937]: Received disconnect from 65.0.89.193 port 38276:11: Bye Bye [preauth] Jan 8 09:16:18 host sshd[12937]: Disconnected from 65.0.89.193 port 38276 [preauth] Jan 8 09:17:44 host sshd[13124]: User root from 176.111.173.164 not allowed because not listed in AllowUsers Jan 8 09:17:44 host sshd[13124]: input_userauth_request: invalid user root [preauth] Jan 8 09:17:45 host unix_chkpwd[13127]: password check failed for user (root) Jan 8 09:17:45 host sshd[13124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.111.173.164 user=root Jan 8 09:17:45 host sshd[13124]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 09:17:47 host sshd[13124]: Failed password for invalid user root from 176.111.173.164 port 42232 ssh2 Jan 8 09:17:50 host unix_chkpwd[13138]: password check failed for user (root) Jan 8 09:17:50 host sshd[13124]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 09:17:52 host sshd[13124]: Failed password for invalid user root from 176.111.173.164 port 42232 ssh2 Jan 8 09:17:55 host unix_chkpwd[13144]: password check failed for user (root) Jan 8 09:17:55 host sshd[13124]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 09:17:57 host sshd[13124]: Failed password for invalid user root from 176.111.173.164 port 42232 ssh2 Jan 8 09:18:00 host unix_chkpwd[13151]: password check failed for user (root) Jan 8 09:18:00 host sshd[13124]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 09:18:02 host sshd[13124]: Failed password for invalid user root from 176.111.173.164 port 42232 ssh2 Jan 8 09:18:42 host sshd[13259]: Invalid user atlas from 65.0.89.193 port 47764 Jan 8 09:18:42 host sshd[13259]: input_userauth_request: invalid user atlas [preauth] Jan 8 09:18:42 host sshd[13259]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:18:42 host sshd[13259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.0.89.193 Jan 8 09:18:44 host sshd[13259]: Failed password for invalid user atlas from 65.0.89.193 port 47764 ssh2 Jan 8 09:18:44 host sshd[13259]: Received disconnect from 65.0.89.193 port 47764:11: Bye Bye [preauth] Jan 8 09:18:44 host sshd[13259]: Disconnected from 65.0.89.193 port 47764 [preauth] Jan 8 09:18:56 host sshd[13271]: Invalid user tesla from 181.129.165.99 port 55021 Jan 8 09:18:56 host sshd[13271]: input_userauth_request: invalid user tesla [preauth] Jan 8 09:18:56 host sshd[13271]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:18:56 host sshd[13271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.165.99 Jan 8 09:18:58 host sshd[13271]: Failed password for invalid user tesla from 181.129.165.99 port 55021 ssh2 Jan 8 09:18:58 host sshd[13271]: Received disconnect from 181.129.165.99 port 55021:11: Bye Bye [preauth] Jan 8 09:18:58 host sshd[13271]: Disconnected from 181.129.165.99 port 55021 [preauth] Jan 8 09:19:59 host sshd[13500]: Invalid user scanner from 65.0.89.193 port 59542 Jan 8 09:19:59 host sshd[13500]: input_userauth_request: invalid user scanner [preauth] Jan 8 09:19:59 host sshd[13500]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:19:59 host sshd[13500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.0.89.193 Jan 8 09:20:01 host sshd[13500]: Failed password for invalid user scanner from 65.0.89.193 port 59542 ssh2 Jan 8 09:20:01 host sshd[13500]: Received disconnect from 65.0.89.193 port 59542:11: Bye Bye [preauth] Jan 8 09:20:01 host sshd[13500]: Disconnected from 65.0.89.193 port 59542 [preauth] Jan 8 09:20:18 host sshd[13590]: Invalid user stephen from 181.129.165.99 port 40917 Jan 8 09:20:18 host sshd[13590]: input_userauth_request: invalid user stephen [preauth] Jan 8 09:20:18 host sshd[13590]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:20:18 host sshd[13590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.165.99 Jan 8 09:20:20 host sshd[13590]: Failed password for invalid user stephen from 181.129.165.99 port 40917 ssh2 Jan 8 09:20:20 host sshd[13590]: Received disconnect from 181.129.165.99 port 40917:11: Bye Bye [preauth] Jan 8 09:20:20 host sshd[13590]: Disconnected from 181.129.165.99 port 40917 [preauth] Jan 8 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=straightcurve user-11=wwwletsstalkfood user-12=wwwevmhonda user-13=bonifacegroup user-14=mrsclean user-15=wwwnexidigital user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 09:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KkVd7YCDPG8ArumD.~ Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KkVd7YCDPG8ArumD.~' Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KkVd7YCDPG8ArumD.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 09:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 09:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 09:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 09:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 09:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 09:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 09:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 09:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 09:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 09:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 09:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 09:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 09:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 09:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 09:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 09:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 09:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 09:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 09:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 09:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 09:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 09:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 09:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 09:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 09:38:44 host sshd[16250]: Invalid user monica from 51.124.205.87 port 57968 Jan 8 09:38:44 host sshd[16250]: input_userauth_request: invalid user monica [preauth] Jan 8 09:38:44 host sshd[16250]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:38:44 host sshd[16250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.124.205.87 Jan 8 09:38:46 host sshd[16250]: Failed password for invalid user monica from 51.124.205.87 port 57968 ssh2 Jan 8 09:38:46 host sshd[16250]: Received disconnect from 51.124.205.87 port 57968:11: Bye Bye [preauth] Jan 8 09:38:46 host sshd[16250]: Disconnected from 51.124.205.87 port 57968 [preauth] Jan 8 09:39:49 host sshd[16375]: Invalid user bc from 194.110.203.109 port 56414 Jan 8 09:39:49 host sshd[16375]: input_userauth_request: invalid user bc [preauth] Jan 8 09:39:49 host sshd[16375]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:39:49 host sshd[16375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 09:39:51 host sshd[16375]: Failed password for invalid user bc from 194.110.203.109 port 56414 ssh2 Jan 8 09:39:54 host sshd[16375]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:39:56 host sshd[16375]: Failed password for invalid user bc from 194.110.203.109 port 56414 ssh2 Jan 8 09:39:58 host sshd[16389]: Invalid user finance from 117.52.173.97 port 38946 Jan 8 09:39:58 host sshd[16389]: input_userauth_request: invalid user finance [preauth] Jan 8 09:39:58 host sshd[16389]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:39:58 host sshd[16389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.52.173.97 Jan 8 09:39:59 host sshd[16375]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:40:00 host sshd[16389]: Failed password for invalid user finance from 117.52.173.97 port 38946 ssh2 Jan 8 09:40:01 host sshd[16389]: Received disconnect from 117.52.173.97 port 38946:11: Bye Bye [preauth] Jan 8 09:40:01 host sshd[16389]: Disconnected from 117.52.173.97 port 38946 [preauth] Jan 8 09:40:01 host sshd[16375]: Failed password for invalid user bc from 194.110.203.109 port 56414 ssh2 Jan 8 09:40:04 host sshd[16375]: Connection closed by 194.110.203.109 port 56414 [preauth] Jan 8 09:40:04 host sshd[16375]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 09:40:58 host sshd[16512]: Invalid user admin from 213.156.55.155 port 45594 Jan 8 09:40:58 host sshd[16512]: input_userauth_request: invalid user admin [preauth] Jan 8 09:40:58 host sshd[16512]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:40:58 host sshd[16512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.156.55.155 Jan 8 09:41:01 host sshd[16512]: Failed password for invalid user admin from 213.156.55.155 port 45594 ssh2 Jan 8 09:41:01 host sshd[16512]: Received disconnect from 213.156.55.155 port 45594:11: Bye Bye [preauth] Jan 8 09:40:58 host sshd[16512]: Invalid user admin from 213.156.55.155 port 45594 Jan 8 09:40:58 host sshd[16512]: input_userauth_request: invalid user admin [preauth] Jan 8 09:40:58 host sshd[16512]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:40:58 host sshd[16512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.156.55.155 Jan 8 09:41:01 host sshd[16512]: Failed password for invalid user admin from 213.156.55.155 port 45594 ssh2 Jan 8 09:41:01 host sshd[16512]: Received disconnect from 213.156.55.155 port 45594:11: Bye Bye [preauth] Jan 8 09:40:58 host sshd[16512]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:40:58 host sshd[16512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.156.55.155 Jan 8 09:41:01 host sshd[16512]: Failed password for invalid user admin from 213.156.55.155 port 45594 ssh2 Jan 8 09:41:01 host sshd[16512]: Received disconnect from 213.156.55.155 port 45594:11: Bye Bye [preauth] Jan 8 09:41:01 host sshd[16512]: Disconnected from 213.156.55.155 port 45594 [preauth] Jan 8 09:41:31 host sshd[16618]: Invalid user jimmy from 135.181.206.7 port 56308 Jan 8 09:41:31 host sshd[16618]: input_userauth_request: invalid user jimmy [preauth] Jan 8 09:41:31 host sshd[16618]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:41:31 host sshd[16618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.181.206.7 Jan 8 09:41:33 host sshd[16618]: Failed password for invalid user jimmy from 135.181.206.7 port 56308 ssh2 Jan 8 09:41:33 host sshd[16618]: Received disconnect from 135.181.206.7 port 56308:11: Bye Bye [preauth] Jan 8 09:41:33 host sshd[16618]: Disconnected from 135.181.206.7 port 56308 [preauth] Jan 8 09:43:24 host sshd[16907]: Invalid user zzz from 172.126.79.44 port 47288 Jan 8 09:43:24 host sshd[16907]: input_userauth_request: invalid user zzz [preauth] Jan 8 09:43:24 host sshd[16907]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:43:24 host sshd[16907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.126.79.44 Jan 8 09:43:25 host sshd[16907]: Failed password for invalid user zzz from 172.126.79.44 port 47288 ssh2 Jan 8 09:43:26 host sshd[16907]: Received disconnect from 172.126.79.44 port 47288:11: Bye Bye [preauth] Jan 8 09:43:26 host sshd[16907]: Disconnected from 172.126.79.44 port 47288 [preauth] Jan 8 09:43:33 host sshd[16948]: Invalid user testuser from 51.124.205.87 port 58192 Jan 8 09:43:33 host sshd[16948]: input_userauth_request: invalid user testuser [preauth] Jan 8 09:43:33 host sshd[16948]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:43:33 host sshd[16948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.124.205.87 Jan 8 09:43:36 host sshd[16948]: Failed password for invalid user testuser from 51.124.205.87 port 58192 ssh2 Jan 8 09:43:36 host sshd[16948]: Received disconnect from 51.124.205.87 port 58192:11: Bye Bye [preauth] Jan 8 09:43:36 host sshd[16948]: Disconnected from 51.124.205.87 port 58192 [preauth] Jan 8 09:44:33 host sshd[17044]: Invalid user finance from 135.181.206.7 port 38556 Jan 8 09:44:33 host sshd[17044]: input_userauth_request: invalid user finance [preauth] Jan 8 09:44:33 host sshd[17044]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:44:33 host sshd[17044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.181.206.7 Jan 8 09:44:35 host sshd[17044]: Failed password for invalid user finance from 135.181.206.7 port 38556 ssh2 Jan 8 09:44:35 host sshd[17044]: Received disconnect from 135.181.206.7 port 38556:11: Bye Bye [preauth] Jan 8 09:44:35 host sshd[17044]: Disconnected from 135.181.206.7 port 38556 [preauth] Jan 8 09:44:38 host sshd[17050]: Invalid user alvaro from 51.124.205.87 port 58302 Jan 8 09:44:38 host sshd[17050]: input_userauth_request: invalid user alvaro [preauth] Jan 8 09:44:38 host sshd[17050]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:44:38 host sshd[17050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.124.205.87 Jan 8 09:44:40 host sshd[17050]: Failed password for invalid user alvaro from 51.124.205.87 port 58302 ssh2 Jan 8 09:44:40 host sshd[17050]: Received disconnect from 51.124.205.87 port 58302:11: Bye Bye [preauth] Jan 8 09:44:40 host sshd[17050]: Disconnected from 51.124.205.87 port 58302 [preauth] Jan 8 09:44:55 host sshd[17110]: Invalid user kevin from 117.52.173.97 port 59472 Jan 8 09:44:55 host sshd[17110]: input_userauth_request: invalid user kevin [preauth] Jan 8 09:44:55 host sshd[17110]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:44:55 host sshd[17110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.52.173.97 Jan 8 09:44:56 host sshd[17110]: Failed password for invalid user kevin from 117.52.173.97 port 59472 ssh2 Jan 8 09:44:56 host sshd[17110]: Received disconnect from 117.52.173.97 port 59472:11: Bye Bye [preauth] Jan 8 09:44:56 host sshd[17110]: Disconnected from 117.52.173.97 port 59472 [preauth] Jan 8 09:45:17 host sshd[17162]: Did not receive identification string from 120.132.122.54 port 15784 Jan 8 09:45:19 host sshd[17164]: Invalid user guest from 120.132.122.54 port 26100 Jan 8 09:45:19 host sshd[17164]: input_userauth_request: invalid user guest [preauth] Jan 8 09:45:19 host sshd[17165]: Invalid user dmdba from 120.132.122.54 port 26082 Jan 8 09:45:19 host sshd[17165]: input_userauth_request: invalid user dmdba [preauth] Jan 8 09:45:19 host sshd[17166]: Invalid user bot from 120.132.122.54 port 26088 Jan 8 09:45:19 host sshd[17166]: input_userauth_request: invalid user bot [preauth] Jan 8 09:45:19 host sshd[17167]: Invalid user esuser from 120.132.122.54 port 26042 Jan 8 09:45:19 host sshd[17167]: input_userauth_request: invalid user esuser [preauth] Jan 8 09:45:19 host sshd[17170]: Invalid user hello from 120.132.122.54 port 26108 Jan 8 09:45:19 host sshd[17170]: input_userauth_request: invalid user hello [preauth] Jan 8 09:45:19 host sshd[17164]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:45:19 host sshd[17164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Jan 8 09:45:19 host sshd[17165]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:45:19 host sshd[17165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Jan 8 09:45:19 host sshd[17166]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:45:19 host sshd[17166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Jan 8 09:45:20 host sshd[17167]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:45:20 host sshd[17167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Jan 8 09:45:20 host sshd[17170]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:45:20 host sshd[17170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Jan 8 09:45:20 host sshd[17174]: User ftp from 120.132.122.54 not allowed because not listed in AllowUsers Jan 8 09:45:20 host sshd[17174]: input_userauth_request: invalid user ftp [preauth] Jan 8 09:45:21 host sshd[17178]: Invalid user ubuntu from 120.132.122.54 port 26074 Jan 8 09:45:21 host sshd[17178]: input_userauth_request: invalid user ubuntu [preauth] Jan 8 09:45:21 host unix_chkpwd[17192]: password check failed for user (ftp) Jan 8 09:45:21 host sshd[17174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 user=ftp Jan 8 09:45:21 host sshd[17174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 8 09:45:21 host sshd[17164]: Failed password for invalid user guest from 120.132.122.54 port 26100 ssh2 Jan 8 09:45:21 host sshd[17165]: Failed password for invalid user dmdba from 120.132.122.54 port 26082 ssh2 Jan 8 09:45:21 host sshd[17166]: Failed password for invalid user bot from 120.132.122.54 port 26088 ssh2 Jan 8 09:45:22 host sshd[17178]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:45:22 host sshd[17178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Jan 8 09:45:22 host sshd[17167]: Failed password for invalid user esuser from 120.132.122.54 port 26042 ssh2 Jan 8 09:45:22 host sshd[17170]: Failed password for invalid user hello from 120.132.122.54 port 26108 ssh2 Jan 8 09:45:22 host sshd[17164]: Connection closed by 120.132.122.54 port 26100 [preauth] Jan 8 09:45:22 host sshd[17165]: Connection closed by 120.132.122.54 port 26082 [preauth] Jan 8 09:45:22 host sshd[17166]: Connection closed by 120.132.122.54 port 26088 [preauth] Jan 8 09:45:22 host sshd[17167]: Connection closed by 120.132.122.54 port 26042 [preauth] Jan 8 09:45:22 host sshd[17170]: Connection closed by 120.132.122.54 port 26108 [preauth] Jan 8 09:45:22 host sshd[17181]: Invalid user ftpuser from 120.132.122.54 port 26101 Jan 8 09:45:22 host sshd[17181]: input_userauth_request: invalid user ftpuser [preauth] Jan 8 09:45:22 host sshd[17185]: Invalid user oracle from 120.132.122.54 port 26116 Jan 8 09:45:22 host sshd[17185]: input_userauth_request: invalid user oracle [preauth] Jan 8 09:45:22 host sshd[17186]: Invalid user hello from 120.132.122.54 port 26080 Jan 8 09:45:22 host sshd[17186]: input_userauth_request: invalid user hello [preauth] Jan 8 09:45:22 host sshd[17189]: Invalid user www from 120.132.122.54 port 26078 Jan 8 09:45:22 host sshd[17189]: input_userauth_request: invalid user www [preauth] Jan 8 09:45:22 host sshd[17181]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:45:22 host sshd[17181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Jan 8 09:45:23 host sshd[17185]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:45:23 host sshd[17185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Jan 8 09:45:23 host sshd[17186]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:45:23 host sshd[17186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Jan 8 09:45:23 host sshd[17189]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:45:23 host sshd[17189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.122.54 Jan 8 09:45:23 host sshd[17182]: Invalid user ubuntu from 120.132.122.54 port 26092 Jan 8 09:45:23 host sshd[17182]: input_userauth_request: invalid user ubuntu [preauth] Jan 8 09:45:23 host sshd[17174]: Failed password for invalid user ftp from 120.132.122.54 port 26076 ssh2 Jan 8 09:45:24 host sshd[17178]: Failed password for invalid user ubuntu from 120.132.122.54 port 26074 ssh2 Jan 8 09:45:24 host sshd[17185]: Failed password for invalid user oracle from 120.132.122.54 port 26116 ssh2 Jan 8 09:45:24 host sshd[17186]: Failed password for invalid user hello from 120.132.122.54 port 26080 ssh2 Jan 8 09:45:24 host sshd[17189]: Failed password for invalid user www from 120.132.122.54 port 26078 ssh2 Jan 8 09:45:25 host sshd[17181]: Failed password for invalid user ftpuser from 120.132.122.54 port 26101 ssh2 Jan 8 09:45:45 host sshd[17288]: Invalid user testing from 135.181.206.7 port 44408 Jan 8 09:45:45 host sshd[17288]: input_userauth_request: invalid user testing [preauth] Jan 8 09:45:45 host sshd[17288]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:45:45 host sshd[17288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.181.206.7 Jan 8 09:45:47 host sshd[17288]: Failed password for invalid user testing from 135.181.206.7 port 44408 ssh2 Jan 8 09:45:47 host sshd[17288]: Received disconnect from 135.181.206.7 port 44408:11: Bye Bye [preauth] Jan 8 09:45:47 host sshd[17288]: Disconnected from 135.181.206.7 port 44408 [preauth] Jan 8 09:46:15 host sshd[17374]: Invalid user cesar from 172.126.79.44 port 50000 Jan 8 09:46:15 host sshd[17374]: input_userauth_request: invalid user cesar [preauth] Jan 8 09:46:15 host sshd[17374]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:46:15 host sshd[17374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.126.79.44 Jan 8 09:46:17 host sshd[17374]: Failed password for invalid user cesar from 172.126.79.44 port 50000 ssh2 Jan 8 09:46:17 host sshd[17374]: Received disconnect from 172.126.79.44 port 50000:11: Bye Bye [preauth] Jan 8 09:46:17 host sshd[17374]: Disconnected from 172.126.79.44 port 50000 [preauth] Jan 8 09:46:27 host sshd[17393]: Invalid user monica from 117.52.173.97 port 58854 Jan 8 09:46:27 host sshd[17393]: input_userauth_request: invalid user monica [preauth] Jan 8 09:46:27 host sshd[17393]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:46:27 host sshd[17393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.52.173.97 Jan 8 09:46:29 host sshd[17393]: Failed password for invalid user monica from 117.52.173.97 port 58854 ssh2 Jan 8 09:47:36 host sshd[17588]: Invalid user nova from 172.126.79.44 port 44598 Jan 8 09:47:36 host sshd[17588]: input_userauth_request: invalid user nova [preauth] Jan 8 09:47:36 host sshd[17588]: pam_unix(sshd:auth): check pass; user unknown Jan 8 09:47:36 host sshd[17588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.126.79.44 Jan 8 09:47:38 host sshd[17588]: Failed password for invalid user nova from 172.126.79.44 port 44598 ssh2 Jan 8 09:54:58 host sshd[18815]: Did not receive identification string from 167.71.166.243 port 37006 Jan 8 10:06:44 host sshd[20869]: Invalid user Debian-snmp from 104.244.74.6 port 54892 Jan 8 10:06:44 host sshd[20869]: input_userauth_request: invalid user Debian-snmp [preauth] Jan 8 10:06:44 host sshd[20869]: pam_unix(sshd:auth): check pass; user unknown Jan 8 10:06:44 host sshd[20869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 8 10:06:46 host sshd[20869]: Failed password for invalid user Debian-snmp from 104.244.74.6 port 54892 ssh2 Jan 8 10:06:46 host sshd[20869]: Connection closed by 104.244.74.6 port 54892 [preauth] Jan 8 10:07:32 host sshd[20979]: Connection closed by 167.71.166.243 port 47974 [preauth] Jan 8 10:17:48 host sshd[22392]: Invalid user pearlynixon@ugotechnologies.com from 36.85.38.23 port 4070 Jan 8 10:17:48 host sshd[22392]: input_userauth_request: invalid user pearlynixon@ugotechnologies.com [preauth] Jan 8 10:17:48 host sshd[22392]: pam_unix(sshd:auth): check pass; user unknown Jan 8 10:17:48 host sshd[22392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.85.38.23 Jan 8 10:17:51 host sshd[22392]: Failed password for invalid user pearlynixon@ugotechnologies.com from 36.85.38.23 port 4070 ssh2 Jan 8 10:17:51 host sshd[22392]: Connection closed by 36.85.38.23 port 4070 [preauth] Jan 8 10:21:24 host sshd[22959]: Invalid user Debian-snmp from 104.244.74.6 port 51270 Jan 8 10:21:24 host sshd[22959]: input_userauth_request: invalid user Debian-snmp [preauth] Jan 8 10:21:24 host sshd[22959]: pam_unix(sshd:auth): check pass; user unknown Jan 8 10:21:24 host sshd[22959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 8 10:21:26 host sshd[22959]: Failed password for invalid user Debian-snmp from 104.244.74.6 port 51270 ssh2 Jan 8 10:21:26 host sshd[22959]: Connection closed by 104.244.74.6 port 51270 [preauth] Jan 8 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=remysagr user-9=wwwkmaorg user-10=mrsclean user-11=wwwnexidigital user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=straightcurve user-17=wwwletsstalkfood user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 10:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vHFnk1Oz25Km99wS.~ Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vHFnk1Oz25Km99wS.~' Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vHFnk1Oz25Km99wS.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 10:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 10:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 10:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 10:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 10:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 10:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 10:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 10:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 10:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 10:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 10:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 10:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 10:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 10:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 10:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 10:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 10:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 10:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 10:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 10:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 10:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 10:47:05 host sshd[26729]: Invalid user brandon from 107.189.30.59 port 34880 Jan 8 10:47:05 host sshd[26729]: input_userauth_request: invalid user brandon [preauth] Jan 8 10:47:05 host sshd[26729]: pam_unix(sshd:auth): check pass; user unknown Jan 8 10:47:05 host sshd[26729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 8 10:47:07 host sshd[26729]: Failed password for invalid user brandon from 107.189.30.59 port 34880 ssh2 Jan 8 10:47:07 host sshd[26729]: Connection closed by 107.189.30.59 port 34880 [preauth] Jan 8 10:47:49 host sshd[26812]: Invalid user admin from 153.197.225.36 port 59684 Jan 8 10:47:49 host sshd[26812]: input_userauth_request: invalid user admin [preauth] Jan 8 10:47:49 host sshd[26812]: pam_unix(sshd:auth): check pass; user unknown Jan 8 10:47:49 host sshd[26812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.197.225.36 Jan 8 10:47:51 host sshd[26812]: Failed password for invalid user admin from 153.197.225.36 port 59684 ssh2 Jan 8 10:47:51 host sshd[26812]: Connection closed by 153.197.225.36 port 59684 [preauth] Jan 8 11:10:31 host sshd[29888]: Invalid user admin from 139.87.96.11 port 41746 Jan 8 11:10:31 host sshd[29888]: input_userauth_request: invalid user admin [preauth] Jan 8 11:10:31 host sshd[29888]: pam_unix(sshd:auth): check pass; user unknown Jan 8 11:10:31 host sshd[29888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.87.96.11 Jan 8 11:10:34 host sshd[29888]: Failed password for invalid user admin from 139.87.96.11 port 41746 ssh2 Jan 8 11:10:34 host sshd[29888]: Received disconnect from 139.87.96.11 port 41746:11: Bye Bye [preauth] Jan 8 11:10:34 host sshd[29888]: Disconnected from 139.87.96.11 port 41746 [preauth] Jan 8 11:17:10 host sshd[30840]: Invalid user iot from 139.87.96.11 port 45104 Jan 8 11:17:10 host sshd[30840]: input_userauth_request: invalid user iot [preauth] Jan 8 11:17:10 host sshd[30840]: pam_unix(sshd:auth): check pass; user unknown Jan 8 11:17:10 host sshd[30840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.87.96.11 Jan 8 11:17:12 host sshd[30840]: Failed password for invalid user iot from 139.87.96.11 port 45104 ssh2 Jan 8 11:17:13 host sshd[30840]: Received disconnect from 139.87.96.11 port 45104:11: Bye Bye [preauth] Jan 8 11:17:13 host sshd[30840]: Disconnected from 139.87.96.11 port 45104 [preauth] Jan 8 11:18:15 host sshd[30993]: Invalid user it from 139.87.96.11 port 39266 Jan 8 11:18:15 host sshd[30993]: input_userauth_request: invalid user it [preauth] Jan 8 11:18:15 host sshd[30993]: pam_unix(sshd:auth): check pass; user unknown Jan 8 11:18:15 host sshd[30993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.87.96.11 Jan 8 11:18:16 host sshd[30993]: Failed password for invalid user it from 139.87.96.11 port 39266 ssh2 Jan 8 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=straightcurve user-4=wwwletsstalkfood user-5=palco123 user-6=gifterman user-7=kottayamcalldriv user-8=phmetals user-9=mrsclean user-10=wwwnexidigital user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=vfmassets user-17=shalinijames user-18=wwwtestugo user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwresourcehunte user-23=keralaholi user-24=wwwrmswll user-25=ugotscom user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 11:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9tZj60Pb8SrMRU8A.~ Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9tZj60Pb8SrMRU8A.~' Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9tZj60Pb8SrMRU8A.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 11:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 11:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 11:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 11:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 11:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 11:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 11:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 11:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 11:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 11:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 11:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 11:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 11:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 11:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 11:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 11:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 11:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 11:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 11:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 11:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 11:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 11:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 11:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 11:23:08 host sshd[32101]: Invalid user adsl from 209.141.55.27 port 37260 Jan 8 11:23:08 host sshd[32101]: input_userauth_request: invalid user adsl [preauth] Jan 8 11:23:08 host sshd[32101]: pam_unix(sshd:auth): check pass; user unknown Jan 8 11:23:08 host sshd[32101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 Jan 8 11:23:10 host sshd[32101]: Failed password for invalid user adsl from 209.141.55.27 port 37260 ssh2 Jan 8 11:23:10 host sshd[32101]: Received disconnect from 209.141.55.27 port 37260:11: Normal Shutdown, Thank you for playing [preauth] Jan 8 11:23:10 host sshd[32101]: Disconnected from 209.141.55.27 port 37260 [preauth] Jan 8 11:25:30 host sshd[32468]: User root from 37.44.238.144 not allowed because not listed in AllowUsers Jan 8 11:25:30 host sshd[32468]: input_userauth_request: invalid user root [preauth] Jan 8 11:25:30 host unix_chkpwd[32471]: password check failed for user (root) Jan 8 11:25:30 host sshd[32468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.238.144 user=root Jan 8 11:25:30 host sshd[32468]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 11:25:31 host sshd[32468]: Failed password for invalid user root from 37.44.238.144 port 50002 ssh2 Jan 8 11:25:31 host sshd[32468]: Received disconnect from 37.44.238.144 port 50002:11: Bye Bye [preauth] Jan 8 11:25:31 host sshd[32468]: Disconnected from 37.44.238.144 port 50002 [preauth] Jan 8 11:25:33 host sshd[32480]: User root from 37.44.238.144 not allowed because not listed in AllowUsers Jan 8 11:25:33 host sshd[32480]: input_userauth_request: invalid user root [preauth] Jan 8 11:25:33 host unix_chkpwd[32486]: password check failed for user (root) Jan 8 11:25:33 host sshd[32480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.238.144 user=root Jan 8 11:25:33 host sshd[32480]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 11:25:35 host sshd[32480]: Failed password for invalid user root from 37.44.238.144 port 33482 ssh2 Jan 8 11:25:35 host sshd[32480]: Received disconnect from 37.44.238.144 port 33482:11: Bye Bye [preauth] Jan 8 11:25:35 host sshd[32480]: Disconnected from 37.44.238.144 port 33482 [preauth] Jan 8 11:39:44 host sshd[2075]: Invalid user bd from 194.110.203.109 port 52492 Jan 8 11:39:44 host sshd[2075]: input_userauth_request: invalid user bd [preauth] Jan 8 11:39:44 host sshd[2075]: pam_unix(sshd:auth): check pass; user unknown Jan 8 11:39:44 host sshd[2075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 11:39:46 host sshd[2075]: Failed password for invalid user bd from 194.110.203.109 port 52492 ssh2 Jan 8 11:39:49 host sshd[2075]: pam_unix(sshd:auth): check pass; user unknown Jan 8 11:39:51 host sshd[2075]: Failed password for invalid user bd from 194.110.203.109 port 52492 ssh2 Jan 8 11:39:54 host sshd[2075]: pam_unix(sshd:auth): check pass; user unknown Jan 8 11:39:56 host sshd[2075]: Failed password for invalid user bd from 194.110.203.109 port 52492 ssh2 Jan 8 11:39:59 host sshd[2075]: Connection closed by 194.110.203.109 port 52492 [preauth] Jan 8 11:39:59 host sshd[2075]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 12:15:01 host sshd[7750]: Connection closed by 172.104.11.46 port 49372 [preauth] Jan 8 12:15:02 host sshd[7753]: Connection closed by 172.104.11.46 port 49382 [preauth] Jan 8 12:15:04 host sshd[7813]: Connection closed by 172.104.11.46 port 49394 [preauth] Jan 8 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=wwwkapin user-9=woodpeck user-10=phmetals user-11=kottayamcalldriv user-12=palco123 user-13=gifterman user-14=mrsclean user-15=wwwnexidigital user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 12:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TmF8EGlNGMBDPUed.~ Jan 8 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TmF8EGlNGMBDPUed.~' Jan 8 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TmF8EGlNGMBDPUed.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 12:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 12:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 12:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 12:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 12:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 12:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 12:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 12:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 12:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 12:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 12:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 12:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 12:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 12:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 12:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 12:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 12:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 12:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 12:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 12:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 12:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 12:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 12:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 12:22:14 host sshd[9069]: Invalid user pearlynixon@ugotechnologies.com from 113.172.203.91 port 64789 Jan 8 12:22:14 host sshd[9069]: input_userauth_request: invalid user pearlynixon@ugotechnologies.com [preauth] Jan 8 12:22:14 host sshd[9069]: pam_unix(sshd:auth): check pass; user unknown Jan 8 12:22:14 host sshd[9069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.203.91 Jan 8 12:22:16 host sshd[9069]: Failed password for invalid user pearlynixon@ugotechnologies.com from 113.172.203.91 port 64789 ssh2 Jan 8 12:22:16 host sshd[9069]: Connection closed by 113.172.203.91 port 64789 [preauth] Jan 8 12:22:17 host sshd[9077]: User root from 113.172.203.91 not allowed because not listed in AllowUsers Jan 8 12:22:17 host sshd[9077]: input_userauth_request: invalid user root [preauth] Jan 8 12:22:17 host unix_chkpwd[9079]: password check failed for user (root) Jan 8 12:22:17 host sshd[9077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.203.91 user=root Jan 8 12:22:17 host sshd[9077]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 12:22:19 host sshd[9077]: Failed password for invalid user root from 113.172.203.91 port 50980 ssh2 Jan 8 12:22:20 host sshd[9077]: Connection closed by 113.172.203.91 port 50980 [preauth] Jan 8 12:22:20 host sshd[9085]: Invalid user pearlynixon from 113.172.203.91 port 53052 Jan 8 12:22:20 host sshd[9085]: input_userauth_request: invalid user pearlynixon [preauth] Jan 8 12:22:20 host sshd[9085]: pam_unix(sshd:auth): check pass; user unknown Jan 8 12:22:20 host sshd[9085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.203.91 Jan 8 12:22:22 host sshd[9085]: Failed password for invalid user pearlynixon from 113.172.203.91 port 53052 ssh2 Jan 8 12:22:22 host sshd[9085]: Connection closed by 113.172.203.91 port 53052 [preauth] Jan 8 12:22:23 host sshd[9092]: Invalid user admin from 113.172.203.91 port 54148 Jan 8 12:22:23 host sshd[9092]: input_userauth_request: invalid user admin [preauth] Jan 8 12:22:23 host sshd[9092]: pam_unix(sshd:auth): check pass; user unknown Jan 8 12:22:23 host sshd[9092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.203.91 Jan 8 12:22:25 host sshd[9092]: Failed password for invalid user admin from 113.172.203.91 port 54148 ssh2 Jan 8 12:42:47 host sshd[12079]: Invalid user demo from 104.244.74.6 port 38318 Jan 8 12:42:47 host sshd[12079]: input_userauth_request: invalid user demo [preauth] Jan 8 12:42:47 host sshd[12079]: pam_unix(sshd:auth): check pass; user unknown Jan 8 12:42:47 host sshd[12079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 8 12:42:50 host sshd[12079]: Failed password for invalid user demo from 104.244.74.6 port 38318 ssh2 Jan 8 12:42:50 host sshd[12079]: Connection closed by 104.244.74.6 port 38318 [preauth] Jan 8 13:04:02 host sshd[15380]: Invalid user julian from 148.72.244.123 port 43464 Jan 8 13:04:02 host sshd[15380]: input_userauth_request: invalid user julian [preauth] Jan 8 13:04:02 host sshd[15380]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:04:02 host sshd[15380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.244.123 Jan 8 13:04:04 host sshd[15380]: Failed password for invalid user julian from 148.72.244.123 port 43464 ssh2 Jan 8 13:04:04 host sshd[15380]: Received disconnect from 148.72.244.123 port 43464:11: Bye Bye [preauth] Jan 8 13:04:04 host sshd[15380]: Disconnected from 148.72.244.123 port 43464 [preauth] Jan 8 13:04:20 host sshd[15412]: Invalid user tester from 104.236.118.222 port 50580 Jan 8 13:04:20 host sshd[15412]: input_userauth_request: invalid user tester [preauth] Jan 8 13:04:20 host sshd[15412]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:04:20 host sshd[15412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.118.222 Jan 8 13:04:22 host sshd[15412]: Failed password for invalid user tester from 104.236.118.222 port 50580 ssh2 Jan 8 13:04:22 host sshd[15412]: Received disconnect from 104.236.118.222 port 50580:11: Bye Bye [preauth] Jan 8 13:04:22 host sshd[15412]: Disconnected from 104.236.118.222 port 50580 [preauth] Jan 8 13:05:22 host sshd[15540]: Invalid user larry from 211.75.183.12 port 43696 Jan 8 13:05:22 host sshd[15540]: input_userauth_request: invalid user larry [preauth] Jan 8 13:05:22 host sshd[15540]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:05:22 host sshd[15540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.183.12 Jan 8 13:05:24 host sshd[15540]: Failed password for invalid user larry from 211.75.183.12 port 43696 ssh2 Jan 8 13:05:24 host sshd[15540]: Received disconnect from 211.75.183.12 port 43696:11: Bye Bye [preauth] Jan 8 13:05:24 host sshd[15540]: Disconnected from 211.75.183.12 port 43696 [preauth] Jan 8 13:06:19 host sshd[15741]: Invalid user nginx from 91.192.136.43 port 46540 Jan 8 13:06:19 host sshd[15741]: input_userauth_request: invalid user nginx [preauth] Jan 8 13:06:19 host sshd[15741]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:06:19 host sshd[15741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.192.136.43 Jan 8 13:06:20 host sshd[15741]: Failed password for invalid user nginx from 91.192.136.43 port 46540 ssh2 Jan 8 13:06:21 host sshd[15741]: Received disconnect from 91.192.136.43 port 46540:11: Bye Bye [preauth] Jan 8 13:06:21 host sshd[15741]: Disconnected from 91.192.136.43 port 46540 [preauth] Jan 8 13:06:47 host sshd[15801]: Invalid user storm from 138.68.162.6 port 55550 Jan 8 13:06:47 host sshd[15801]: input_userauth_request: invalid user storm [preauth] Jan 8 13:06:47 host sshd[15801]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:06:47 host sshd[15801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.162.6 Jan 8 13:06:49 host sshd[15801]: Failed password for invalid user storm from 138.68.162.6 port 55550 ssh2 Jan 8 13:06:50 host sshd[15801]: Received disconnect from 138.68.162.6 port 55550:11: Bye Bye [preauth] Jan 8 13:06:50 host sshd[15801]: Disconnected from 138.68.162.6 port 55550 [preauth] Jan 8 13:07:31 host sshd[15877]: Invalid user lcx from 43.159.39.194 port 59468 Jan 8 13:07:31 host sshd[15877]: input_userauth_request: invalid user lcx [preauth] Jan 8 13:07:31 host sshd[15877]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:07:31 host sshd[15877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.39.194 Jan 8 13:07:34 host sshd[15877]: Failed password for invalid user lcx from 43.159.39.194 port 59468 ssh2 Jan 8 13:07:34 host sshd[15877]: Received disconnect from 43.159.39.194 port 59468:11: Bye Bye [preauth] Jan 8 13:07:34 host sshd[15877]: Disconnected from 43.159.39.194 port 59468 [preauth] Jan 8 13:09:50 host sshd[16144]: Invalid user ubuntu from 104.236.118.222 port 52284 Jan 8 13:09:50 host sshd[16144]: input_userauth_request: invalid user ubuntu [preauth] Jan 8 13:09:50 host sshd[16144]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:09:50 host sshd[16144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.118.222 Jan 8 13:09:52 host sshd[16144]: Failed password for invalid user ubuntu from 104.236.118.222 port 52284 ssh2 Jan 8 13:09:52 host sshd[16144]: Received disconnect from 104.236.118.222 port 52284:11: Bye Bye [preauth] Jan 8 13:09:52 host sshd[16144]: Disconnected from 104.236.118.222 port 52284 [preauth] Jan 8 13:10:07 host sshd[16193]: Invalid user lcx from 211.75.183.12 port 52740 Jan 8 13:10:07 host sshd[16193]: input_userauth_request: invalid user lcx [preauth] Jan 8 13:10:07 host sshd[16193]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:10:07 host sshd[16193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.183.12 Jan 8 13:10:09 host sshd[16193]: Failed password for invalid user lcx from 211.75.183.12 port 52740 ssh2 Jan 8 13:10:09 host sshd[16193]: Received disconnect from 211.75.183.12 port 52740:11: Bye Bye [preauth] Jan 8 13:10:09 host sshd[16193]: Disconnected from 211.75.183.12 port 52740 [preauth] Jan 8 13:10:18 host sshd[16208]: Invalid user soporte from 138.68.162.6 port 42564 Jan 8 13:10:18 host sshd[16208]: input_userauth_request: invalid user soporte [preauth] Jan 8 13:10:18 host sshd[16208]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:10:18 host sshd[16208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.162.6 Jan 8 13:10:20 host sshd[16208]: Failed password for invalid user soporte from 138.68.162.6 port 42564 ssh2 Jan 8 13:10:20 host sshd[16208]: Received disconnect from 138.68.162.6 port 42564:11: Bye Bye [preauth] Jan 8 13:10:20 host sshd[16208]: Disconnected from 138.68.162.6 port 42564 [preauth] Jan 8 13:10:46 host sshd[16274]: Invalid user test from 91.192.136.43 port 38312 Jan 8 13:10:46 host sshd[16274]: input_userauth_request: invalid user test [preauth] Jan 8 13:10:46 host sshd[16274]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:10:46 host sshd[16274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.192.136.43 Jan 8 13:10:48 host sshd[16274]: Failed password for invalid user test from 91.192.136.43 port 38312 ssh2 Jan 8 13:10:49 host sshd[16274]: Received disconnect from 91.192.136.43 port 38312:11: Bye Bye [preauth] Jan 8 13:10:49 host sshd[16274]: Disconnected from 91.192.136.43 port 38312 [preauth] Jan 8 13:11:00 host sshd[16351]: Invalid user trojanuser from 104.236.118.222 port 51928 Jan 8 13:11:00 host sshd[16351]: input_userauth_request: invalid user trojanuser [preauth] Jan 8 13:11:00 host sshd[16351]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:11:00 host sshd[16351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.118.222 Jan 8 13:11:02 host sshd[16351]: Failed password for invalid user trojanuser from 104.236.118.222 port 51928 ssh2 Jan 8 13:11:03 host sshd[16351]: Received disconnect from 104.236.118.222 port 51928:11: Bye Bye [preauth] Jan 8 13:11:03 host sshd[16351]: Disconnected from 104.236.118.222 port 51928 [preauth] Jan 8 13:11:04 host sshd[16409]: Invalid user 7days from 43.159.39.194 port 37960 Jan 8 13:11:04 host sshd[16409]: input_userauth_request: invalid user 7days [preauth] Jan 8 13:11:04 host sshd[16409]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:11:04 host sshd[16409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.39.194 Jan 8 13:11:06 host sshd[16409]: Failed password for invalid user 7days from 43.159.39.194 port 37960 ssh2 Jan 8 13:11:06 host sshd[16409]: Received disconnect from 43.159.39.194 port 37960:11: Bye Bye [preauth] Jan 8 13:11:06 host sshd[16409]: Disconnected from 43.159.39.194 port 37960 [preauth] Jan 8 13:11:26 host sshd[16467]: Invalid user admin from 138.68.162.6 port 41628 Jan 8 13:11:26 host sshd[16467]: input_userauth_request: invalid user admin [preauth] Jan 8 13:11:26 host sshd[16467]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:11:26 host sshd[16467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.162.6 Jan 8 13:11:28 host sshd[16467]: Failed password for invalid user admin from 138.68.162.6 port 41628 ssh2 Jan 8 13:11:28 host sshd[16467]: Received disconnect from 138.68.162.6 port 41628:11: Bye Bye [preauth] Jan 8 13:11:28 host sshd[16467]: Disconnected from 138.68.162.6 port 41628 [preauth] Jan 8 13:11:30 host sshd[16494]: Invalid user lucas from 211.75.183.12 port 50786 Jan 8 13:11:30 host sshd[16494]: input_userauth_request: invalid user lucas [preauth] Jan 8 13:11:30 host sshd[16494]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:11:30 host sshd[16494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.183.12 Jan 8 13:11:32 host sshd[16494]: Failed password for invalid user lucas from 211.75.183.12 port 50786 ssh2 Jan 8 13:11:32 host sshd[16494]: Received disconnect from 211.75.183.12 port 50786:11: Bye Bye [preauth] Jan 8 13:11:32 host sshd[16494]: Disconnected from 211.75.183.12 port 50786 [preauth] Jan 8 13:11:33 host sshd[16530]: Invalid user cod4 from 148.72.244.123 port 46208 Jan 8 13:11:33 host sshd[16530]: input_userauth_request: invalid user cod4 [preauth] Jan 8 13:11:33 host sshd[16530]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:11:33 host sshd[16530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.244.123 Jan 8 13:11:35 host sshd[16530]: Failed password for invalid user cod4 from 148.72.244.123 port 46208 ssh2 Jan 8 13:11:35 host sshd[16530]: Received disconnect from 148.72.244.123 port 46208:11: Bye Bye [preauth] Jan 8 13:11:35 host sshd[16530]: Disconnected from 148.72.244.123 port 46208 [preauth] Jan 8 13:12:02 host sshd[16614]: Invalid user developer from 91.192.136.43 port 36636 Jan 8 13:12:02 host sshd[16614]: input_userauth_request: invalid user developer [preauth] Jan 8 13:12:02 host sshd[16614]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:12:02 host sshd[16614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.192.136.43 Jan 8 13:12:04 host sshd[16614]: Failed password for invalid user developer from 91.192.136.43 port 36636 ssh2 Jan 8 13:12:05 host sshd[16614]: Received disconnect from 91.192.136.43 port 36636:11: Bye Bye [preauth] Jan 8 13:12:05 host sshd[16614]: Disconnected from 91.192.136.43 port 36636 [preauth] Jan 8 13:12:26 host sshd[16673]: Invalid user mietek from 43.159.39.194 port 45994 Jan 8 13:12:26 host sshd[16673]: input_userauth_request: invalid user mietek [preauth] Jan 8 13:12:26 host sshd[16673]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:12:26 host sshd[16673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.39.194 Jan 8 13:12:28 host sshd[16673]: Failed password for invalid user mietek from 43.159.39.194 port 45994 ssh2 Jan 8 13:12:28 host sshd[16673]: Received disconnect from 43.159.39.194 port 45994:11: Bye Bye [preauth] Jan 8 13:12:28 host sshd[16673]: Disconnected from 43.159.39.194 port 45994 [preauth] Jan 8 13:13:00 host sshd[16767]: Invalid user common from 148.72.244.123 port 41402 Jan 8 13:13:00 host sshd[16767]: input_userauth_request: invalid user common [preauth] Jan 8 13:13:00 host sshd[16767]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:13:00 host sshd[16767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.244.123 Jan 8 13:13:02 host sshd[16767]: Failed password for invalid user common from 148.72.244.123 port 41402 ssh2 Jan 8 13:13:02 host sshd[16767]: Received disconnect from 148.72.244.123 port 41402:11: Bye Bye [preauth] Jan 8 13:13:02 host sshd[16767]: Disconnected from 148.72.244.123 port 41402 [preauth] Jan 8 13:16:13 host sshd[17156]: Invalid user pearlynixon@ugotechnologies.com from 103.147.9.60 port 16974 Jan 8 13:16:13 host sshd[17156]: input_userauth_request: invalid user pearlynixon@ugotechnologies.com [preauth] Jan 8 13:16:13 host sshd[17156]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:16:13 host sshd[17156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.9.60 Jan 8 13:16:15 host sshd[17156]: Failed password for invalid user pearlynixon@ugotechnologies.com from 103.147.9.60 port 16974 ssh2 Jan 8 13:16:15 host sshd[17156]: Connection closed by 103.147.9.60 port 16974 [preauth] Jan 8 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=phmetals user-8=kottayamcalldriv user-9=gifterman user-10=palco123 user-11=woodpeck user-12=wwwkapin user-13=disposeat user-14=remysagr user-15=wwwkmaorg user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 13:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bUy9cwy8ulH2C3ud.~ Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bUy9cwy8ulH2C3ud.~' Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bUy9cwy8ulH2C3ud.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 13:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 13:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 13:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 13:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 13:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 13:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 13:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 13:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 13:22:11 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 13:22:13 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 13:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 13:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 13:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 13:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 13:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 13:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 13:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 13:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 13:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 13:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 13:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 13:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 13:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 13:22:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 13:22:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 13:22:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 13:22:24 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 13:22:25 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 13:35:13 host sshd[21031]: Invalid user from 2.57.122.23 port 34318 Jan 8 13:35:13 host sshd[21031]: input_userauth_request: invalid user [preauth] Jan 8 13:35:23 host sshd[21031]: Connection closed by 2.57.122.23 port 34318 [preauth] Jan 8 13:37:47 host sshd[21464]: Invalid user be from 194.110.203.109 port 38336 Jan 8 13:37:47 host sshd[21464]: input_userauth_request: invalid user be [preauth] Jan 8 13:37:47 host sshd[21464]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:37:47 host sshd[21464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 13:37:49 host sshd[21464]: Failed password for invalid user be from 194.110.203.109 port 38336 ssh2 Jan 8 13:37:53 host sshd[21464]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:37:55 host sshd[21464]: Failed password for invalid user be from 194.110.203.109 port 38336 ssh2 Jan 8 13:37:58 host sshd[21464]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:38:00 host sshd[21464]: Failed password for invalid user be from 194.110.203.109 port 38336 ssh2 Jan 8 13:38:04 host sshd[21464]: Connection closed by 194.110.203.109 port 38336 [preauth] Jan 8 13:38:04 host sshd[21464]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 13:42:49 host sshd[22183]: Invalid user vipin@ugotechnologies.com from 180.248.1.109 port 65463 Jan 8 13:42:49 host sshd[22183]: input_userauth_request: invalid user vipin@ugotechnologies.com [preauth] Jan 8 13:42:49 host sshd[22183]: pam_unix(sshd:auth): check pass; user unknown Jan 8 13:42:49 host sshd[22183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.248.1.109 Jan 8 13:42:52 host sshd[22183]: Failed password for invalid user vipin@ugotechnologies.com from 180.248.1.109 port 65463 ssh2 Jan 8 13:42:52 host sshd[22183]: Connection closed by 180.248.1.109 port 65463 [preauth] Jan 8 14:10:57 host sshd[26203]: Bad protocol version identification '\003' from 185.73.124.135 port 64407 Jan 8 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=straightcurve user-4=wwwletsstalkfood user-5=palco123 user-6=gifterman user-7=phmetals user-8=kottayamcalldriv user-9=mrsclean user-10=wwwnexidigital user-11=remysagr user-12=disposeat user-13=wwwkmaorg user-14=wwwkapin user-15=woodpeck user-16=vfmassets user-17=shalinijames user-18=wwwtestugo user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=ugotscom user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 14:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gy6M6KGKAr5h5hhO.~ Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gy6M6KGKAr5h5hhO.~' Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gy6M6KGKAr5h5hhO.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 14:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 14:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 14:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 14:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 14:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 14:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 14:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 14:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 14:22:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 14:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 14:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 14:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 14:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 14:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 14:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 14:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 14:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 14:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 14:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 14:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 14:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 14:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 14:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 14:22:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 14:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 14:22:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 14:22:25 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 14:32:55 host sshd[29324]: Invalid user pearlynixon@ugotechnologies.com from 190.153.93.2 port 4409 Jan 8 14:32:55 host sshd[29324]: input_userauth_request: invalid user pearlynixon@ugotechnologies.com [preauth] Jan 8 14:32:55 host sshd[29324]: pam_unix(sshd:auth): check pass; user unknown Jan 8 14:32:55 host sshd[29324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.153.93.2 Jan 8 14:32:57 host sshd[29324]: Failed password for invalid user pearlynixon@ugotechnologies.com from 190.153.93.2 port 4409 ssh2 Jan 8 14:32:57 host sshd[29324]: Connection closed by 190.153.93.2 port 4409 [preauth] Jan 8 14:32:59 host sshd[29336]: User root from 190.153.93.2 not allowed because not listed in AllowUsers Jan 8 14:32:59 host sshd[29336]: input_userauth_request: invalid user root [preauth] Jan 8 14:32:59 host unix_chkpwd[29339]: password check failed for user (root) Jan 8 14:32:59 host sshd[29336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.153.93.2 user=root Jan 8 14:32:59 host sshd[29336]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 14:33:01 host sshd[29336]: Failed password for invalid user root from 190.153.93.2 port 4410 ssh2 Jan 8 14:33:02 host sshd[29336]: Connection closed by 190.153.93.2 port 4410 [preauth] Jan 8 15:07:31 host sshd[2420]: Invalid user abel from 119.4.250.94 port 45106 Jan 8 15:07:31 host sshd[2420]: input_userauth_request: invalid user abel [preauth] Jan 8 15:07:31 host sshd[2420]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:07:31 host sshd[2420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.250.94 Jan 8 15:07:33 host sshd[2420]: Failed password for invalid user abel from 119.4.250.94 port 45106 ssh2 Jan 8 15:07:33 host sshd[2420]: Received disconnect from 119.4.250.94 port 45106:11: Bye Bye [preauth] Jan 8 15:07:33 host sshd[2420]: Disconnected from 119.4.250.94 port 45106 [preauth] Jan 8 15:08:20 host sshd[2512]: Invalid user etl from 157.230.250.192 port 55338 Jan 8 15:08:20 host sshd[2512]: input_userauth_request: invalid user etl [preauth] Jan 8 15:08:20 host sshd[2512]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:08:20 host sshd[2512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.250.192 Jan 8 15:08:22 host sshd[2512]: Failed password for invalid user etl from 157.230.250.192 port 55338 ssh2 Jan 8 15:08:22 host sshd[2512]: Received disconnect from 157.230.250.192 port 55338:11: Bye Bye [preauth] Jan 8 15:08:22 host sshd[2512]: Disconnected from 157.230.250.192 port 55338 [preauth] Jan 8 15:10:39 host sshd[2949]: Invalid user test from 216.172.165.97 port 37968 Jan 8 15:10:39 host sshd[2949]: input_userauth_request: invalid user test [preauth] Jan 8 15:10:39 host sshd[2949]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:10:39 host sshd[2949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.172.165.97 Jan 8 15:10:42 host sshd[2949]: Failed password for invalid user test from 216.172.165.97 port 37968 ssh2 Jan 8 15:10:42 host sshd[2949]: Received disconnect from 216.172.165.97 port 37968:11: Bye Bye [preauth] Jan 8 15:10:42 host sshd[2949]: Disconnected from 216.172.165.97 port 37968 [preauth] Jan 8 15:12:00 host sshd[3090]: Invalid user hms from 20.226.74.99 port 45020 Jan 8 15:12:00 host sshd[3090]: input_userauth_request: invalid user hms [preauth] Jan 8 15:12:00 host sshd[3090]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:12:00 host sshd[3090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.226.74.99 Jan 8 15:12:03 host sshd[3090]: Failed password for invalid user hms from 20.226.74.99 port 45020 ssh2 Jan 8 15:12:03 host sshd[3090]: Received disconnect from 20.226.74.99 port 45020:11: Bye Bye [preauth] Jan 8 15:12:03 host sshd[3090]: Disconnected from 20.226.74.99 port 45020 [preauth] Jan 8 15:12:19 host sshd[3129]: Invalid user stat from 186.148.167.218 port 47082 Jan 8 15:12:19 host sshd[3129]: input_userauth_request: invalid user stat [preauth] Jan 8 15:12:19 host sshd[3129]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:12:19 host sshd[3129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.148.167.218 Jan 8 15:12:20 host sshd[3129]: Failed password for invalid user stat from 186.148.167.218 port 47082 ssh2 Jan 8 15:12:20 host sshd[3129]: Received disconnect from 186.148.167.218 port 47082:11: Bye Bye [preauth] Jan 8 15:12:20 host sshd[3129]: Disconnected from 186.148.167.218 port 47082 [preauth] Jan 8 15:12:26 host sshd[3147]: Invalid user steam from 103.242.199.203 port 32998 Jan 8 15:12:26 host sshd[3147]: input_userauth_request: invalid user steam [preauth] Jan 8 15:12:26 host sshd[3147]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:12:26 host sshd[3147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.199.203 Jan 8 15:12:28 host sshd[3147]: Failed password for invalid user steam from 103.242.199.203 port 32998 ssh2 Jan 8 15:12:28 host sshd[3147]: Received disconnect from 103.242.199.203 port 32998:11: Bye Bye [preauth] Jan 8 15:12:28 host sshd[3147]: Disconnected from 103.242.199.203 port 32998 [preauth] Jan 8 15:12:31 host sshd[3174]: Invalid user best from 27.254.137.144 port 57470 Jan 8 15:12:31 host sshd[3174]: input_userauth_request: invalid user best [preauth] Jan 8 15:12:31 host sshd[3174]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:12:31 host sshd[3174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144 Jan 8 15:12:32 host sshd[3174]: Failed password for invalid user best from 27.254.137.144 port 57470 ssh2 Jan 8 15:12:32 host sshd[3174]: Received disconnect from 27.254.137.144 port 57470:11: Bye Bye [preauth] Jan 8 15:12:32 host sshd[3174]: Disconnected from 27.254.137.144 port 57470 [preauth] Jan 8 15:12:42 host sshd[3197]: Invalid user roland from 159.203.102.122 port 42444 Jan 8 15:12:42 host sshd[3197]: input_userauth_request: invalid user roland [preauth] Jan 8 15:12:42 host sshd[3197]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:12:42 host sshd[3197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.102.122 Jan 8 15:12:44 host sshd[3197]: Failed password for invalid user roland from 159.203.102.122 port 42444 ssh2 Jan 8 15:12:45 host sshd[3197]: Received disconnect from 159.203.102.122 port 42444:11: Bye Bye [preauth] Jan 8 15:12:45 host sshd[3197]: Disconnected from 159.203.102.122 port 42444 [preauth] Jan 8 15:12:51 host sshd[3207]: Invalid user develop from 41.74.112.230 port 43358 Jan 8 15:12:51 host sshd[3207]: input_userauth_request: invalid user develop [preauth] Jan 8 15:12:51 host sshd[3207]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:12:51 host sshd[3207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.74.112.230 Jan 8 15:12:52 host sshd[3207]: Failed password for invalid user develop from 41.74.112.230 port 43358 ssh2 Jan 8 15:12:53 host sshd[3207]: Received disconnect from 41.74.112.230 port 43358:11: Bye Bye [preauth] Jan 8 15:12:53 host sshd[3207]: Disconnected from 41.74.112.230 port 43358 [preauth] Jan 8 15:13:11 host sshd[3259]: Invalid user ping from 140.148.227.28 port 6714 Jan 8 15:13:11 host sshd[3259]: input_userauth_request: invalid user ping [preauth] Jan 8 15:13:11 host sshd[3259]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:13:11 host sshd[3259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.148.227.28 Jan 8 15:13:13 host sshd[3259]: Failed password for invalid user ping from 140.148.227.28 port 6714 ssh2 Jan 8 15:13:13 host sshd[3259]: Received disconnect from 140.148.227.28 port 6714:11: Bye Bye [preauth] Jan 8 15:13:13 host sshd[3259]: Disconnected from 140.148.227.28 port 6714 [preauth] Jan 8 15:13:18 host sshd[3268]: Invalid user testftp from 137.184.185.16 port 33850 Jan 8 15:13:18 host sshd[3268]: input_userauth_request: invalid user testftp [preauth] Jan 8 15:13:18 host sshd[3268]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:13:18 host sshd[3268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.185.16 Jan 8 15:13:20 host sshd[3268]: Failed password for invalid user testftp from 137.184.185.16 port 33850 ssh2 Jan 8 15:13:20 host sshd[3268]: Received disconnect from 137.184.185.16 port 33850:11: Bye Bye [preauth] Jan 8 15:13:20 host sshd[3268]: Disconnected from 137.184.185.16 port 33850 [preauth] Jan 8 15:13:21 host sshd[3274]: Invalid user router from 157.230.250.192 port 49972 Jan 8 15:13:21 host sshd[3274]: input_userauth_request: invalid user router [preauth] Jan 8 15:13:21 host sshd[3274]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:13:21 host sshd[3274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.250.192 Jan 8 15:13:24 host sshd[3274]: Failed password for invalid user router from 157.230.250.192 port 49972 ssh2 Jan 8 15:13:24 host sshd[3274]: Received disconnect from 157.230.250.192 port 49972:11: Bye Bye [preauth] Jan 8 15:13:24 host sshd[3274]: Disconnected from 157.230.250.192 port 49972 [preauth] Jan 8 15:14:02 host sshd[3347]: Invalid user deploy from 216.172.165.97 port 46802 Jan 8 15:14:02 host sshd[3347]: input_userauth_request: invalid user deploy [preauth] Jan 8 15:14:02 host sshd[3347]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:14:02 host sshd[3347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.172.165.97 Jan 8 15:14:04 host sshd[3347]: Failed password for invalid user deploy from 216.172.165.97 port 46802 ssh2 Jan 8 15:14:04 host sshd[3347]: Received disconnect from 216.172.165.97 port 46802:11: Bye Bye [preauth] Jan 8 15:14:04 host sshd[3347]: Disconnected from 216.172.165.97 port 46802 [preauth] Jan 8 15:14:12 host sshd[3371]: Invalid user deploy from 20.226.74.99 port 38292 Jan 8 15:14:12 host sshd[3371]: input_userauth_request: invalid user deploy [preauth] Jan 8 15:14:12 host sshd[3371]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:14:12 host sshd[3371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.226.74.99 Jan 8 15:14:14 host sshd[3371]: Failed password for invalid user deploy from 20.226.74.99 port 38292 ssh2 Jan 8 15:14:14 host sshd[3371]: Received disconnect from 20.226.74.99 port 38292:11: Bye Bye [preauth] Jan 8 15:14:14 host sshd[3371]: Disconnected from 20.226.74.99 port 38292 [preauth] Jan 8 15:14:27 host sshd[3387]: Invalid user dan from 190.160.149.241 port 39945 Jan 8 15:14:27 host sshd[3387]: input_userauth_request: invalid user dan [preauth] Jan 8 15:14:27 host sshd[3387]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:14:27 host sshd[3387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.160.149.241 Jan 8 15:14:28 host sshd[3414]: Invalid user cumulus from 14.97.218.174 port 4395 Jan 8 15:14:28 host sshd[3414]: input_userauth_request: invalid user cumulus [preauth] Jan 8 15:14:28 host sshd[3414]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:14:28 host sshd[3414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.218.174 Jan 8 15:14:28 host sshd[3387]: Failed password for invalid user dan from 190.160.149.241 port 39945 ssh2 Jan 8 15:14:29 host sshd[3387]: Received disconnect from 190.160.149.241 port 39945:11: Bye Bye [preauth] Jan 8 15:14:29 host sshd[3387]: Disconnected from 190.160.149.241 port 39945 [preauth] Jan 8 15:14:30 host sshd[3414]: Failed password for invalid user cumulus from 14.97.218.174 port 4395 ssh2 Jan 8 15:14:30 host sshd[3414]: Received disconnect from 14.97.218.174 port 4395:11: Bye Bye [preauth] Jan 8 15:14:30 host sshd[3414]: Disconnected from 14.97.218.174 port 4395 [preauth] Jan 8 15:14:43 host sshd[3444]: Invalid user vsftp from 157.230.250.192 port 48838 Jan 8 15:14:43 host sshd[3444]: input_userauth_request: invalid user vsftp [preauth] Jan 8 15:14:43 host sshd[3444]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:14:43 host sshd[3444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.250.192 Jan 8 15:14:45 host sshd[3444]: Failed password for invalid user vsftp from 157.230.250.192 port 48838 ssh2 Jan 8 15:14:45 host sshd[3444]: Received disconnect from 157.230.250.192 port 48838:11: Bye Bye [preauth] Jan 8 15:14:45 host sshd[3444]: Disconnected from 157.230.250.192 port 48838 [preauth] Jan 8 15:15:05 host sshd[3528]: Invalid user steam from 27.254.137.144 port 35182 Jan 8 15:15:05 host sshd[3528]: input_userauth_request: invalid user steam [preauth] Jan 8 15:15:05 host sshd[3528]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:15:05 host sshd[3528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144 Jan 8 15:15:07 host sshd[3528]: Failed password for invalid user steam from 27.254.137.144 port 35182 ssh2 Jan 8 15:15:07 host sshd[3528]: Received disconnect from 27.254.137.144 port 35182:11: Bye Bye [preauth] Jan 8 15:15:07 host sshd[3528]: Disconnected from 27.254.137.144 port 35182 [preauth] Jan 8 15:15:31 host sshd[3585]: Invalid user delme from 216.172.165.97 port 43296 Jan 8 15:15:31 host sshd[3585]: input_userauth_request: invalid user delme [preauth] Jan 8 15:15:31 host sshd[3585]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:15:31 host sshd[3585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.172.165.97 Jan 8 15:15:33 host sshd[3585]: Failed password for invalid user delme from 216.172.165.97 port 43296 ssh2 Jan 8 15:15:33 host sshd[3585]: Received disconnect from 216.172.165.97 port 43296:11: Bye Bye [preauth] Jan 8 15:15:33 host sshd[3585]: Disconnected from 216.172.165.97 port 43296 [preauth] Jan 8 15:15:40 host sshd[3742]: Invalid user test from 20.226.74.99 port 52720 Jan 8 15:15:40 host sshd[3742]: input_userauth_request: invalid user test [preauth] Jan 8 15:15:40 host sshd[3742]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:15:40 host sshd[3742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.226.74.99 Jan 8 15:15:42 host sshd[3742]: Failed password for invalid user test from 20.226.74.99 port 52720 ssh2 Jan 8 15:15:42 host sshd[3742]: Received disconnect from 20.226.74.99 port 52720:11: Bye Bye [preauth] Jan 8 15:15:42 host sshd[3742]: Disconnected from 20.226.74.99 port 52720 [preauth] Jan 8 15:15:48 host sshd[3784]: User tomcat from 103.242.199.203 not allowed because not listed in AllowUsers Jan 8 15:15:48 host sshd[3784]: input_userauth_request: invalid user tomcat [preauth] Jan 8 15:15:48 host unix_chkpwd[3788]: password check failed for user (tomcat) Jan 8 15:15:48 host sshd[3784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.199.203 user=tomcat Jan 8 15:15:48 host sshd[3784]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Jan 8 15:15:51 host sshd[3784]: Failed password for invalid user tomcat from 103.242.199.203 port 45228 ssh2 Jan 8 15:15:51 host sshd[3784]: Received disconnect from 103.242.199.203 port 45228:11: Bye Bye [preauth] Jan 8 15:15:51 host sshd[3784]: Disconnected from 103.242.199.203 port 45228 [preauth] Jan 8 15:15:54 host sshd[3791]: Invalid user jack from 181.23.68.64 port 38957 Jan 8 15:15:54 host sshd[3791]: input_userauth_request: invalid user jack [preauth] Jan 8 15:15:54 host sshd[3791]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:15:54 host sshd[3791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.23.68.64 Jan 8 15:15:55 host sshd[3794]: Invalid user hms from 140.148.227.28 port 25365 Jan 8 15:15:55 host sshd[3794]: input_userauth_request: invalid user hms [preauth] Jan 8 15:15:55 host sshd[3794]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:15:55 host sshd[3794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.148.227.28 Jan 8 15:15:56 host sshd[3791]: Failed password for invalid user jack from 181.23.68.64 port 38957 ssh2 Jan 8 15:15:56 host sshd[3791]: Received disconnect from 181.23.68.64 port 38957:11: Bye Bye [preauth] Jan 8 15:15:56 host sshd[3791]: Disconnected from 181.23.68.64 port 38957 [preauth] Jan 8 15:15:57 host sshd[3794]: Failed password for invalid user hms from 140.148.227.28 port 25365 ssh2 Jan 8 15:15:57 host sshd[3794]: Received disconnect from 140.148.227.28 port 25365:11: Bye Bye [preauth] Jan 8 15:15:57 host sshd[3794]: Disconnected from 140.148.227.28 port 25365 [preauth] Jan 8 15:16:08 host sshd[3854]: Invalid user admin1 from 137.184.185.16 port 39780 Jan 8 15:16:08 host sshd[3854]: input_userauth_request: invalid user admin1 [preauth] Jan 8 15:16:08 host sshd[3854]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:16:08 host sshd[3854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.185.16 Jan 8 15:16:10 host sshd[3854]: Failed password for invalid user admin1 from 137.184.185.16 port 39780 ssh2 Jan 8 15:16:10 host sshd[3854]: Received disconnect from 137.184.185.16 port 39780:11: Bye Bye [preauth] Jan 8 15:16:10 host sshd[3854]: Disconnected from 137.184.185.16 port 39780 [preauth] Jan 8 15:16:17 host sshd[3866]: Invalid user ubuntu from 41.74.112.230 port 56217 Jan 8 15:16:17 host sshd[3866]: input_userauth_request: invalid user ubuntu [preauth] Jan 8 15:16:17 host sshd[3866]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:16:17 host sshd[3866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.74.112.230 Jan 8 15:16:19 host sshd[3866]: Failed password for invalid user ubuntu from 41.74.112.230 port 56217 ssh2 Jan 8 15:16:19 host sshd[3866]: Received disconnect from 41.74.112.230 port 56217:11: Bye Bye [preauth] Jan 8 15:16:19 host sshd[3866]: Disconnected from 41.74.112.230 port 56217 [preauth] Jan 8 15:16:41 host sshd[3918]: Invalid user ly from 27.254.137.144 port 34734 Jan 8 15:16:41 host sshd[3918]: input_userauth_request: invalid user ly [preauth] Jan 8 15:16:41 host sshd[3918]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:16:41 host sshd[3918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144 Jan 8 15:16:43 host sshd[3918]: Failed password for invalid user ly from 27.254.137.144 port 34734 ssh2 Jan 8 15:16:43 host sshd[3918]: Received disconnect from 27.254.137.144 port 34734:11: Bye Bye [preauth] Jan 8 15:16:43 host sshd[3918]: Disconnected from 27.254.137.144 port 34734 [preauth] Jan 8 15:17:08 host sshd[3982]: Invalid user usuario2 from 137.184.185.16 port 49572 Jan 8 15:17:08 host sshd[3982]: input_userauth_request: invalid user usuario2 [preauth] Jan 8 15:17:08 host sshd[3982]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:17:08 host sshd[3982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.185.16 Jan 8 15:17:10 host sshd[3982]: Failed password for invalid user usuario2 from 137.184.185.16 port 49572 ssh2 Jan 8 15:17:11 host sshd[4005]: Invalid user ethan from 190.160.149.241 port 57699 Jan 8 15:17:11 host sshd[4005]: input_userauth_request: invalid user ethan [preauth] Jan 8 15:17:11 host sshd[4005]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:17:11 host sshd[4005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.160.149.241 Jan 8 15:17:12 host sshd[4021]: Invalid user informix from 41.74.112.230 port 39163 Jan 8 15:17:12 host sshd[4021]: input_userauth_request: invalid user informix [preauth] Jan 8 15:17:12 host sshd[4021]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:17:12 host sshd[4021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.74.112.230 Jan 8 15:17:13 host sshd[4005]: Failed password for invalid user ethan from 190.160.149.241 port 57699 ssh2 Jan 8 15:17:13 host sshd[4005]: Received disconnect from 190.160.149.241 port 57699:11: Bye Bye [preauth] Jan 8 15:17:13 host sshd[4005]: Disconnected from 190.160.149.241 port 57699 [preauth] Jan 8 15:17:14 host sshd[4021]: Failed password for invalid user informix from 41.74.112.230 port 39163 ssh2 Jan 8 15:17:14 host sshd[4028]: Invalid user thor from 159.203.102.122 port 57572 Jan 8 15:17:14 host sshd[4028]: input_userauth_request: invalid user thor [preauth] Jan 8 15:17:14 host sshd[4028]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:17:14 host sshd[4028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.102.122 Jan 8 15:17:16 host sshd[4028]: Failed password for invalid user thor from 159.203.102.122 port 57572 ssh2 Jan 8 15:17:16 host sshd[4028]: Received disconnect from 159.203.102.122 port 57572:11: Bye Bye [preauth] Jan 8 15:17:16 host sshd[4028]: Disconnected from 159.203.102.122 port 57572 [preauth] Jan 8 15:17:29 host sshd[4108]: Invalid user james from 186.148.167.218 port 35802 Jan 8 15:17:29 host sshd[4108]: input_userauth_request: invalid user james [preauth] Jan 8 15:17:29 host sshd[4108]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:17:29 host sshd[4108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.148.167.218 Jan 8 15:17:32 host sshd[4115]: Invalid user user1 from 140.148.227.28 port 30841 Jan 8 15:17:32 host sshd[4115]: input_userauth_request: invalid user user1 [preauth] Jan 8 15:17:32 host sshd[4115]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:17:32 host sshd[4115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.148.227.28 Jan 8 15:17:32 host sshd[4108]: Failed password for invalid user james from 186.148.167.218 port 35802 ssh2 Jan 8 15:17:32 host sshd[4108]: Received disconnect from 186.148.167.218 port 35802:11: Bye Bye [preauth] Jan 8 15:17:32 host sshd[4108]: Disconnected from 186.148.167.218 port 35802 [preauth] Jan 8 15:17:33 host sshd[4115]: Failed password for invalid user user1 from 140.148.227.28 port 30841 ssh2 Jan 8 15:17:34 host sshd[4115]: Received disconnect from 140.148.227.28 port 30841:11: Bye Bye [preauth] Jan 8 15:17:34 host sshd[4115]: Disconnected from 140.148.227.28 port 30841 [preauth] Jan 8 15:17:38 host sshd[4160]: Invalid user admin from 14.97.218.174 port 22450 Jan 8 15:17:38 host sshd[4160]: input_userauth_request: invalid user admin [preauth] Jan 8 15:17:38 host sshd[4160]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:17:38 host sshd[4160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.218.174 Jan 8 15:17:40 host sshd[4160]: Failed password for invalid user admin from 14.97.218.174 port 22450 ssh2 Jan 8 15:17:40 host sshd[4160]: Received disconnect from 14.97.218.174 port 22450:11: Bye Bye [preauth] Jan 8 15:17:40 host sshd[4160]: Disconnected from 14.97.218.174 port 22450 [preauth] Jan 8 15:18:27 host sshd[4224]: Invalid user pedro from 159.203.102.122 port 52692 Jan 8 15:18:27 host sshd[4224]: input_userauth_request: invalid user pedro [preauth] Jan 8 15:18:27 host sshd[4224]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:18:27 host sshd[4224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.102.122 Jan 8 15:18:29 host sshd[4224]: Failed password for invalid user pedro from 159.203.102.122 port 52692 ssh2 Jan 8 15:18:43 host sshd[4309]: Invalid user devops from 190.160.149.241 port 43302 Jan 8 15:18:43 host sshd[4309]: input_userauth_request: invalid user devops [preauth] Jan 8 15:18:43 host sshd[4309]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:18:43 host sshd[4309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.160.149.241 Jan 8 15:18:45 host sshd[4309]: Failed password for invalid user devops from 190.160.149.241 port 43302 ssh2 Jan 8 15:19:15 host sshd[4400]: Invalid user report from 14.97.218.174 port 36129 Jan 8 15:19:15 host sshd[4400]: input_userauth_request: invalid user report [preauth] Jan 8 15:19:15 host sshd[4400]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:19:15 host sshd[4400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.218.174 Jan 8 15:19:17 host sshd[4400]: Failed password for invalid user report from 14.97.218.174 port 36129 ssh2 Jan 8 15:19:17 host sshd[4400]: Received disconnect from 14.97.218.174 port 36129:11: Bye Bye [preauth] Jan 8 15:19:17 host sshd[4400]: Disconnected from 14.97.218.174 port 36129 [preauth] Jan 8 15:19:40 host sshd[4487]: Invalid user minikube from 119.4.250.94 port 60722 Jan 8 15:19:40 host sshd[4487]: input_userauth_request: invalid user minikube [preauth] Jan 8 15:19:40 host sshd[4487]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:19:40 host sshd[4487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.250.94 Jan 8 15:19:41 host sshd[4487]: Failed password for invalid user minikube from 119.4.250.94 port 60722 ssh2 Jan 8 15:19:42 host sshd[4487]: Received disconnect from 119.4.250.94 port 60722:11: Bye Bye [preauth] Jan 8 15:19:42 host sshd[4487]: Disconnected from 119.4.250.94 port 60722 [preauth] Jan 8 15:20:07 host sshd[4569]: Invalid user wj from 181.23.68.64 port 53707 Jan 8 15:20:07 host sshd[4569]: input_userauth_request: invalid user wj [preauth] Jan 8 15:20:07 host sshd[4569]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:20:07 host sshd[4569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.23.68.64 Jan 8 15:20:10 host sshd[4569]: Failed password for invalid user wj from 181.23.68.64 port 53707 ssh2 Jan 8 15:20:10 host sshd[4569]: Received disconnect from 181.23.68.64 port 53707:11: Bye Bye [preauth] Jan 8 15:20:10 host sshd[4569]: Disconnected from 181.23.68.64 port 53707 [preauth] Jan 8 15:20:39 host sshd[4636]: Invalid user best from 119.4.250.94 port 50604 Jan 8 15:20:39 host sshd[4636]: input_userauth_request: invalid user best [preauth] Jan 8 15:20:39 host sshd[4636]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:20:39 host sshd[4636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.250.94 Jan 8 15:20:41 host sshd[4636]: Failed password for invalid user best from 119.4.250.94 port 50604 ssh2 Jan 8 15:20:41 host sshd[4636]: Received disconnect from 119.4.250.94 port 50604:11: Bye Bye [preauth] Jan 8 15:20:41 host sshd[4636]: Disconnected from 119.4.250.94 port 50604 [preauth] Jan 8 15:20:47 host sshd[4740]: Invalid user demo from 104.244.74.6 port 59146 Jan 8 15:20:47 host sshd[4740]: input_userauth_request: invalid user demo [preauth] Jan 8 15:20:47 host sshd[4740]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:20:47 host sshd[4740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 8 15:20:49 host sshd[4740]: Failed password for invalid user demo from 104.244.74.6 port 59146 ssh2 Jan 8 15:20:50 host sshd[4740]: Connection closed by 104.244.74.6 port 59146 [preauth] Jan 8 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=straightcurve user-4=wwwletsstalkfood user-5=palco123 user-6=gifterman user-7=phmetals user-8=kottayamcalldriv user-9=mrsclean user-10=wwwnexidigital user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=vfmassets user-17=shalinijames user-18=wwwtestugo user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwresourcehunte user-23=keralaholi user-24=wwwrmswll user-25=ugotscom user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 15:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-q07UfakCwzaAkgjh.~ Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-q07UfakCwzaAkgjh.~' Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-q07UfakCwzaAkgjh.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 15:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 15:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 15:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 15:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 15:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 15:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 15:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 15:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 15:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 15:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 15:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 15:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 15:22:05 host sshd[5083]: Invalid user tes from 181.23.68.64 port 49793 Jan 8 15:22:05 host sshd[5083]: input_userauth_request: invalid user tes [preauth] Jan 8 15:22:05 host sshd[5083]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:22:05 host sshd[5083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.23.68.64 Jan 8 15:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 15:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 15:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 15:22:07 host sshd[5083]: Failed password for invalid user tes from 181.23.68.64 port 49793 ssh2 Jan 8 15:22:07 host sshd[5083]: Received disconnect from 181.23.68.64 port 49793:11: Bye Bye [preauth] Jan 8 15:22:07 host sshd[5083]: Disconnected from 181.23.68.64 port 49793 [preauth] Jan 8 15:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 15:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 15:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 15:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 15:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 15:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 15:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 15:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 15:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 15:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 15:24:47 host sshd[5501]: Invalid user demo from 104.244.74.6 port 44476 Jan 8 15:24:47 host sshd[5501]: input_userauth_request: invalid user demo [preauth] Jan 8 15:24:47 host sshd[5501]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:24:47 host sshd[5501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 8 15:24:50 host sshd[5501]: Failed password for invalid user demo from 104.244.74.6 port 44476 ssh2 Jan 8 15:24:50 host sshd[5501]: Connection closed by 104.244.74.6 port 44476 [preauth] Jan 8 15:27:28 host sshd[5791]: User root from 49.88.112.60 not allowed because not listed in AllowUsers Jan 8 15:27:28 host sshd[5791]: input_userauth_request: invalid user root [preauth] Jan 8 15:27:28 host unix_chkpwd[5820]: password check failed for user (root) Jan 8 15:27:28 host sshd[5791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60 user=root Jan 8 15:27:28 host sshd[5791]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 15:27:30 host sshd[5791]: Failed password for invalid user root from 49.88.112.60 port 63663 ssh2 Jan 8 15:27:30 host unix_chkpwd[5823]: password check failed for user (root) Jan 8 15:27:30 host sshd[5791]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 15:27:32 host sshd[5791]: Failed password for invalid user root from 49.88.112.60 port 63663 ssh2 Jan 8 15:27:33 host unix_chkpwd[5826]: password check failed for user (root) Jan 8 15:27:33 host sshd[5791]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 15:27:34 host sshd[5791]: Failed password for invalid user root from 49.88.112.60 port 63663 ssh2 Jan 8 15:27:35 host sshd[5791]: Received disconnect from 49.88.112.60 port 63663:11: [preauth] Jan 8 15:27:35 host sshd[5791]: Disconnected from 49.88.112.60 port 63663 [preauth] Jan 8 15:27:35 host sshd[5791]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60 user=root Jan 8 15:39:15 host sshd[7423]: Invalid user bf from 194.110.203.109 port 54922 Jan 8 15:39:15 host sshd[7423]: input_userauth_request: invalid user bf [preauth] Jan 8 15:39:15 host sshd[7423]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:39:15 host sshd[7423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 15:39:17 host sshd[7423]: Failed password for invalid user bf from 194.110.203.109 port 54922 ssh2 Jan 8 15:39:20 host sshd[7423]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:39:22 host sshd[7423]: Failed password for invalid user bf from 194.110.203.109 port 54922 ssh2 Jan 8 15:39:25 host sshd[7423]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:39:27 host sshd[7423]: Failed password for invalid user bf from 194.110.203.109 port 54922 ssh2 Jan 8 15:39:30 host sshd[7423]: Connection closed by 194.110.203.109 port 54922 [preauth] Jan 8 15:39:30 host sshd[7423]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 15:41:09 host sshd[7743]: Invalid user adam from 107.189.30.59 port 49572 Jan 8 15:41:09 host sshd[7743]: input_userauth_request: invalid user adam [preauth] Jan 8 15:41:09 host sshd[7743]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:41:09 host sshd[7743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 8 15:41:11 host sshd[7743]: Failed password for invalid user adam from 107.189.30.59 port 49572 ssh2 Jan 8 15:41:12 host sshd[7743]: Connection closed by 107.189.30.59 port 49572 [preauth] Jan 8 15:54:35 host sshd[9689]: Invalid user demo from 104.244.74.6 port 49304 Jan 8 15:54:35 host sshd[9689]: input_userauth_request: invalid user demo [preauth] Jan 8 15:54:35 host sshd[9689]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:54:35 host sshd[9689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 8 15:54:38 host sshd[9689]: Failed password for invalid user demo from 104.244.74.6 port 49304 ssh2 Jan 8 15:54:38 host sshd[9689]: Connection closed by 104.244.74.6 port 49304 [preauth] Jan 8 15:58:13 host sshd[10273]: Invalid user aaron from 94.153.212.68 port 56612 Jan 8 15:58:13 host sshd[10273]: input_userauth_request: invalid user aaron [preauth] Jan 8 15:58:13 host sshd[10273]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:58:13 host sshd[10273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.68 Jan 8 15:58:15 host sshd[10273]: Failed password for invalid user aaron from 94.153.212.68 port 56612 ssh2 Jan 8 15:58:15 host sshd[10273]: Received disconnect from 94.153.212.68 port 56612:11: Bye Bye [preauth] Jan 8 15:58:15 host sshd[10273]: Disconnected from 94.153.212.68 port 56612 [preauth] Jan 8 15:59:57 host sshd[10444]: Invalid user oracle from 41.82.208.182 port 14747 Jan 8 15:59:57 host sshd[10444]: input_userauth_request: invalid user oracle [preauth] Jan 8 15:59:57 host sshd[10444]: pam_unix(sshd:auth): check pass; user unknown Jan 8 15:59:57 host sshd[10444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.82.208.182 Jan 8 15:59:59 host sshd[10444]: Failed password for invalid user oracle from 41.82.208.182 port 14747 ssh2 Jan 8 15:59:59 host sshd[10444]: Received disconnect from 41.82.208.182 port 14747:11: Bye Bye [preauth] Jan 8 15:59:59 host sshd[10444]: Disconnected from 41.82.208.182 port 14747 [preauth] Jan 8 16:00:15 host sshd[10506]: Did not receive identification string from 167.71.166.243 port 57980 Jan 8 16:02:01 host sshd[10726]: Invalid user alex from 51.68.136.72 port 59050 Jan 8 16:02:01 host sshd[10726]: input_userauth_request: invalid user alex [preauth] Jan 8 16:02:01 host sshd[10726]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:02:01 host sshd[10726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.136.72 Jan 8 16:02:03 host sshd[10726]: Failed password for invalid user alex from 51.68.136.72 port 59050 ssh2 Jan 8 16:02:03 host sshd[10726]: Received disconnect from 51.68.136.72 port 59050:11: Bye Bye [preauth] Jan 8 16:02:03 host sshd[10726]: Disconnected from 51.68.136.72 port 59050 [preauth] Jan 8 16:02:56 host sshd[10841]: Invalid user aaron from 208.80.210.242 port 48732 Jan 8 16:02:56 host sshd[10841]: input_userauth_request: invalid user aaron [preauth] Jan 8 16:02:56 host sshd[10841]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:02:56 host sshd[10841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.80.210.242 Jan 8 16:02:58 host sshd[10841]: Failed password for invalid user aaron from 208.80.210.242 port 48732 ssh2 Jan 8 16:02:58 host sshd[10841]: Received disconnect from 208.80.210.242 port 48732:11: Bye Bye [preauth] Jan 8 16:02:58 host sshd[10841]: Disconnected from 208.80.210.242 port 48732 [preauth] Jan 8 16:04:44 host sshd[11042]: Invalid user ftp_user from 94.153.212.68 port 60578 Jan 8 16:04:44 host sshd[11042]: input_userauth_request: invalid user ftp_user [preauth] Jan 8 16:04:44 host sshd[11042]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:04:44 host sshd[11042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.68 Jan 8 16:04:46 host sshd[11042]: Failed password for invalid user ftp_user from 94.153.212.68 port 60578 ssh2 Jan 8 16:04:46 host sshd[11042]: Received disconnect from 94.153.212.68 port 60578:11: Bye Bye [preauth] Jan 8 16:04:46 host sshd[11042]: Disconnected from 94.153.212.68 port 60578 [preauth] Jan 8 16:05:12 host sshd[11120]: Invalid user huang from 167.71.196.217 port 60520 Jan 8 16:05:12 host sshd[11120]: input_userauth_request: invalid user huang [preauth] Jan 8 16:05:12 host sshd[11120]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:05:12 host sshd[11120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.196.217 Jan 8 16:05:15 host sshd[11120]: Failed password for invalid user huang from 167.71.196.217 port 60520 ssh2 Jan 8 16:05:15 host sshd[11120]: Received disconnect from 167.71.196.217 port 60520:11: Bye Bye [preauth] Jan 8 16:05:15 host sshd[11120]: Disconnected from 167.71.196.217 port 60520 [preauth] Jan 8 16:05:36 host sshd[11177]: Invalid user sysadmin from 41.82.208.182 port 43244 Jan 8 16:05:36 host sshd[11177]: input_userauth_request: invalid user sysadmin [preauth] Jan 8 16:05:36 host sshd[11177]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:05:36 host sshd[11177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.82.208.182 Jan 8 16:05:38 host sshd[11177]: Failed password for invalid user sysadmin from 41.82.208.182 port 43244 ssh2 Jan 8 16:05:38 host sshd[11177]: Received disconnect from 41.82.208.182 port 43244:11: Bye Bye [preauth] Jan 8 16:05:38 host sshd[11177]: Disconnected from 41.82.208.182 port 43244 [preauth] Jan 8 16:05:43 host sshd[11303]: Invalid user ubuntu from 208.80.210.242 port 54404 Jan 8 16:05:43 host sshd[11303]: input_userauth_request: invalid user ubuntu [preauth] Jan 8 16:05:43 host sshd[11303]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:05:43 host sshd[11303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.80.210.242 Jan 8 16:05:45 host sshd[11303]: Failed password for invalid user ubuntu from 208.80.210.242 port 54404 ssh2 Jan 8 16:05:45 host sshd[11303]: Received disconnect from 208.80.210.242 port 54404:11: Bye Bye [preauth] Jan 8 16:05:45 host sshd[11303]: Disconnected from 208.80.210.242 port 54404 [preauth] Jan 8 16:05:45 host sshd[11306]: Invalid user ftp_user from 51.68.136.72 port 48786 Jan 8 16:05:45 host sshd[11306]: input_userauth_request: invalid user ftp_user [preauth] Jan 8 16:05:45 host sshd[11306]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:05:45 host sshd[11306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.136.72 Jan 8 16:05:47 host sshd[11306]: Failed password for invalid user ftp_user from 51.68.136.72 port 48786 ssh2 Jan 8 16:05:48 host sshd[11306]: Received disconnect from 51.68.136.72 port 48786:11: Bye Bye [preauth] Jan 8 16:05:48 host sshd[11306]: Disconnected from 51.68.136.72 port 48786 [preauth] Jan 8 16:05:59 host sshd[11321]: Invalid user ubuntu from 94.153.212.68 port 59218 Jan 8 16:05:59 host sshd[11321]: input_userauth_request: invalid user ubuntu [preauth] Jan 8 16:05:59 host sshd[11321]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:05:59 host sshd[11321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.68 Jan 8 16:06:01 host sshd[11321]: Failed password for invalid user ubuntu from 94.153.212.68 port 59218 ssh2 Jan 8 16:06:01 host sshd[11321]: Received disconnect from 94.153.212.68 port 59218:11: Bye Bye [preauth] Jan 8 16:06:01 host sshd[11321]: Disconnected from 94.153.212.68 port 59218 [preauth] Jan 8 16:06:45 host sshd[11445]: Invalid user huang from 208.80.210.242 port 49454 Jan 8 16:06:45 host sshd[11445]: input_userauth_request: invalid user huang [preauth] Jan 8 16:06:45 host sshd[11445]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:06:45 host sshd[11445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.80.210.242 Jan 8 16:06:47 host sshd[11449]: Invalid user abc from 41.82.208.182 port 6800 Jan 8 16:06:47 host sshd[11449]: input_userauth_request: invalid user abc [preauth] Jan 8 16:06:47 host sshd[11449]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:06:47 host sshd[11449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.82.208.182 Jan 8 16:06:47 host sshd[11452]: Invalid user test_ftp from 167.71.196.217 port 56122 Jan 8 16:06:47 host sshd[11452]: input_userauth_request: invalid user test_ftp [preauth] Jan 8 16:06:47 host sshd[11452]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:06:47 host sshd[11452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.196.217 Jan 8 16:06:48 host sshd[11445]: Failed password for invalid user huang from 208.80.210.242 port 49454 ssh2 Jan 8 16:06:48 host sshd[11445]: Received disconnect from 208.80.210.242 port 49454:11: Bye Bye [preauth] Jan 8 16:06:48 host sshd[11445]: Disconnected from 208.80.210.242 port 49454 [preauth] Jan 8 16:06:49 host sshd[11449]: Failed password for invalid user abc from 41.82.208.182 port 6800 ssh2 Jan 8 16:06:49 host sshd[11449]: Received disconnect from 41.82.208.182 port 6800:11: Bye Bye [preauth] Jan 8 16:06:49 host sshd[11449]: Disconnected from 41.82.208.182 port 6800 [preauth] Jan 8 16:06:49 host sshd[11455]: Invalid user opc from 51.68.136.72 port 49710 Jan 8 16:06:49 host sshd[11455]: input_userauth_request: invalid user opc [preauth] Jan 8 16:06:49 host sshd[11455]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:06:49 host sshd[11455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.136.72 Jan 8 16:06:49 host sshd[11452]: Failed password for invalid user test_ftp from 167.71.196.217 port 56122 ssh2 Jan 8 16:06:49 host sshd[11452]: Received disconnect from 167.71.196.217 port 56122:11: Bye Bye [preauth] Jan 8 16:06:49 host sshd[11452]: Disconnected from 167.71.196.217 port 56122 [preauth] Jan 8 16:06:51 host sshd[11455]: Failed password for invalid user opc from 51.68.136.72 port 49710 ssh2 Jan 8 16:08:06 host sshd[11675]: Invalid user amir from 167.71.196.217 port 50620 Jan 8 16:08:06 host sshd[11675]: input_userauth_request: invalid user amir [preauth] Jan 8 16:08:06 host sshd[11675]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:08:06 host sshd[11675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.196.217 Jan 8 16:08:08 host sshd[11675]: Failed password for invalid user amir from 167.71.196.217 port 50620 ssh2 Jan 8 16:08:08 host sshd[11675]: Received disconnect from 167.71.196.217 port 50620:11: Bye Bye [preauth] Jan 8 16:08:08 host sshd[11675]: Disconnected from 167.71.196.217 port 50620 [preauth] Jan 8 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 16:22:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 16:22:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 16:22:13 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zGIlgCgNCTE5tz1S.~ Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zGIlgCgNCTE5tz1S.~' Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zGIlgCgNCTE5tz1S.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 16:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 16:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 16:22:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 16:22:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 16:22:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 16:22:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 16:22:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 16:22:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 16:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 16:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 16:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 16:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 16:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 16:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 16:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 16:22:22 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 16:22:24 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 16:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 16:22:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 16:22:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 16:22:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 16:22:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 16:22:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 16:22:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 16:22:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 16:22:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 16:22:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 16:22:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 16:22:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 16:22:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 16:22:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 16:22:37 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 16:22:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 16:22:38 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 16:22:39 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 16:23:32 host sshd[14863]: Invalid user pearlynixon@ugotechnologies.com from 117.5.156.68 port 31406 Jan 8 16:23:32 host sshd[14863]: input_userauth_request: invalid user pearlynixon@ugotechnologies.com [preauth] Jan 8 16:23:32 host sshd[14863]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:23:32 host sshd[14863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.5.156.68 Jan 8 16:23:34 host sshd[14863]: Failed password for invalid user pearlynixon@ugotechnologies.com from 117.5.156.68 port 31406 ssh2 Jan 8 16:23:35 host sshd[14863]: Connection closed by 117.5.156.68 port 31406 [preauth] Jan 8 16:23:36 host sshd[14874]: User root from 117.5.156.68 not allowed because not listed in AllowUsers Jan 8 16:23:36 host sshd[14874]: input_userauth_request: invalid user root [preauth] Jan 8 16:23:36 host unix_chkpwd[14881]: password check failed for user (root) Jan 8 16:23:36 host sshd[14874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.5.156.68 user=root Jan 8 16:23:36 host sshd[14874]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 16:23:38 host sshd[14874]: Failed password for invalid user root from 117.5.156.68 port 64832 ssh2 Jan 8 16:23:39 host sshd[14874]: Connection closed by 117.5.156.68 port 64832 [preauth] Jan 8 16:23:40 host sshd[14891]: Invalid user pearlynixon from 117.5.156.68 port 57815 Jan 8 16:23:40 host sshd[14891]: input_userauth_request: invalid user pearlynixon [preauth] Jan 8 16:23:40 host sshd[14891]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:23:40 host sshd[14891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.5.156.68 Jan 8 16:23:42 host sshd[14891]: Failed password for invalid user pearlynixon from 117.5.156.68 port 57815 ssh2 Jan 8 16:36:35 host sshd[17599]: Invalid user deployer from 88.142.46.185 port 58430 Jan 8 16:36:35 host sshd[17599]: input_userauth_request: invalid user deployer [preauth] Jan 8 16:36:35 host sshd[17599]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:36:35 host sshd[17599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.142.46.185 Jan 8 16:36:37 host sshd[17599]: Failed password for invalid user deployer from 88.142.46.185 port 58430 ssh2 Jan 8 16:36:37 host sshd[17599]: Received disconnect from 88.142.46.185 port 58430:11: Bye Bye [preauth] Jan 8 16:36:37 host sshd[17599]: Disconnected from 88.142.46.185 port 58430 [preauth] Jan 8 16:37:55 host sshd[17829]: Invalid user wordpress from 88.142.46.185 port 58908 Jan 8 16:37:55 host sshd[17829]: input_userauth_request: invalid user wordpress [preauth] Jan 8 16:37:55 host sshd[17829]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:37:55 host sshd[17829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.142.46.185 Jan 8 16:37:57 host sshd[17829]: Failed password for invalid user wordpress from 88.142.46.185 port 58908 ssh2 Jan 8 16:37:57 host sshd[17829]: Received disconnect from 88.142.46.185 port 58908:11: Bye Bye [preauth] Jan 8 16:37:57 host sshd[17829]: Disconnected from 88.142.46.185 port 58908 [preauth] Jan 8 16:39:05 host sshd[18029]: Invalid user alison from 88.142.46.185 port 58242 Jan 8 16:39:05 host sshd[18029]: input_userauth_request: invalid user alison [preauth] Jan 8 16:39:05 host sshd[18029]: pam_unix(sshd:auth): check pass; user unknown Jan 8 16:39:05 host sshd[18029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.142.46.185 Jan 8 16:39:07 host sshd[18029]: Failed password for invalid user alison from 88.142.46.185 port 58242 ssh2 Jan 8 16:43:22 host sshd[18981]: Did not receive identification string from 58.72.18.130 port 40490 Jan 8 16:46:38 host sshd[19663]: Did not receive identification string from 106.75.182.206 port 25116 Jan 8 16:46:51 host sshd[19667]: Connection closed by 106.75.182.206 port 25802 [preauth] Jan 8 16:50:41 host sshd[20407]: Did not receive identification string from 159.89.87.244 port 60580 Jan 8 17:03:16 host sshd[23064]: Invalid user .syslog from 143.244.158.100 port 55360 Jan 8 17:03:16 host sshd[23064]: input_userauth_request: invalid user .syslog [preauth] Jan 8 17:03:16 host sshd[23064]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:03:16 host sshd[23064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.158.100 Jan 8 17:03:17 host sshd[23064]: Failed password for invalid user .syslog from 143.244.158.100 port 55360 ssh2 Jan 8 17:03:18 host sshd[23064]: Received disconnect from 143.244.158.100 port 55360:11: Bye Bye [preauth] Jan 8 17:03:18 host sshd[23064]: Disconnected from 143.244.158.100 port 55360 [preauth] Jan 8 17:07:50 host sshd[24011]: Invalid user edwin from 187.95.124.103 port 44120 Jan 8 17:07:50 host sshd[24011]: input_userauth_request: invalid user edwin [preauth] Jan 8 17:07:50 host sshd[24011]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:07:50 host sshd[24011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.124.103 Jan 8 17:07:52 host sshd[24011]: Failed password for invalid user edwin from 187.95.124.103 port 44120 ssh2 Jan 8 17:07:53 host sshd[24011]: Received disconnect from 187.95.124.103 port 44120:11: Bye Bye [preauth] Jan 8 17:07:53 host sshd[24011]: Disconnected from 187.95.124.103 port 44120 [preauth] Jan 8 17:08:29 host sshd[24261]: Invalid user sig from 192.3.253.7 port 54674 Jan 8 17:08:29 host sshd[24261]: input_userauth_request: invalid user sig [preauth] Jan 8 17:08:29 host sshd[24261]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:08:29 host sshd[24261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.253.7 Jan 8 17:08:31 host sshd[24261]: Failed password for invalid user sig from 192.3.253.7 port 54674 ssh2 Jan 8 17:08:31 host sshd[24261]: Received disconnect from 192.3.253.7 port 54674:11: Bye Bye [preauth] Jan 8 17:08:31 host sshd[24261]: Disconnected from 192.3.253.7 port 54674 [preauth] Jan 8 17:11:33 host sshd[24931]: Invalid user ftp_user from 43.156.13.3 port 33308 Jan 8 17:11:33 host sshd[24931]: input_userauth_request: invalid user ftp_user [preauth] Jan 8 17:11:33 host sshd[24931]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:11:33 host sshd[24931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.13.3 Jan 8 17:11:35 host sshd[24931]: Failed password for invalid user ftp_user from 43.156.13.3 port 33308 ssh2 Jan 8 17:11:35 host sshd[24931]: Received disconnect from 43.156.13.3 port 33308:11: Bye Bye [preauth] Jan 8 17:11:35 host sshd[24931]: Disconnected from 43.156.13.3 port 33308 [preauth] Jan 8 17:12:15 host sshd[25049]: Invalid user ssl from 198.46.215.53 port 37098 Jan 8 17:12:15 host sshd[25049]: input_userauth_request: invalid user ssl [preauth] Jan 8 17:12:15 host sshd[25049]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:12:15 host sshd[25049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.215.53 Jan 8 17:12:17 host sshd[25049]: Failed password for invalid user ssl from 198.46.215.53 port 37098 ssh2 Jan 8 17:12:18 host sshd[25049]: Received disconnect from 198.46.215.53 port 37098:11: Bye Bye [preauth] Jan 8 17:12:18 host sshd[25049]: Disconnected from 198.46.215.53 port 37098 [preauth] Jan 8 17:12:34 host sshd[25133]: Invalid user user from 24.199.104.140 port 37148 Jan 8 17:12:34 host sshd[25133]: input_userauth_request: invalid user user [preauth] Jan 8 17:12:34 host sshd[25133]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:12:34 host sshd[25133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.140 Jan 8 17:12:36 host sshd[25133]: Failed password for invalid user user from 24.199.104.140 port 37148 ssh2 Jan 8 17:12:36 host sshd[25133]: Received disconnect from 24.199.104.140 port 37148:11: Bye Bye [preauth] Jan 8 17:12:36 host sshd[25133]: Disconnected from 24.199.104.140 port 37148 [preauth] Jan 8 17:13:59 host sshd[25420]: Invalid user rosemarie from 201.185.1.173 port 60970 Jan 8 17:13:59 host sshd[25420]: input_userauth_request: invalid user rosemarie [preauth] Jan 8 17:13:59 host sshd[25420]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:13:59 host sshd[25420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.185.1.173 Jan 8 17:14:01 host sshd[25420]: Failed password for invalid user rosemarie from 201.185.1.173 port 60970 ssh2 Jan 8 17:14:01 host sshd[25420]: Received disconnect from 201.185.1.173 port 60970:11: Bye Bye [preauth] Jan 8 17:14:01 host sshd[25420]: Disconnected from 201.185.1.173 port 60970 [preauth] Jan 8 17:14:16 host sshd[25486]: Invalid user market from 198.46.215.53 port 42188 Jan 8 17:14:16 host sshd[25486]: input_userauth_request: invalid user market [preauth] Jan 8 17:14:16 host sshd[25486]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:14:16 host sshd[25486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.215.53 Jan 8 17:14:18 host sshd[25486]: Failed password for invalid user market from 198.46.215.53 port 42188 ssh2 Jan 8 17:14:18 host sshd[25486]: Received disconnect from 198.46.215.53 port 42188:11: Bye Bye [preauth] Jan 8 17:14:18 host sshd[25486]: Disconnected from 198.46.215.53 port 42188 [preauth] Jan 8 17:14:53 host sshd[25635]: Invalid user ts3bot from 192.3.253.7 port 56244 Jan 8 17:14:53 host sshd[25635]: input_userauth_request: invalid user ts3bot [preauth] Jan 8 17:14:53 host sshd[25635]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:14:53 host sshd[25635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.253.7 Jan 8 17:14:54 host sshd[25639]: Invalid user jiaxing from 5.78.40.253 port 36216 Jan 8 17:14:54 host sshd[25639]: input_userauth_request: invalid user jiaxing [preauth] Jan 8 17:14:54 host sshd[25639]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:14:54 host sshd[25639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.78.40.253 Jan 8 17:14:55 host sshd[25635]: Failed password for invalid user ts3bot from 192.3.253.7 port 56244 ssh2 Jan 8 17:14:55 host sshd[25635]: Received disconnect from 192.3.253.7 port 56244:11: Bye Bye [preauth] Jan 8 17:14:55 host sshd[25635]: Disconnected from 192.3.253.7 port 56244 [preauth] Jan 8 17:14:55 host sshd[25639]: Failed password for invalid user jiaxing from 5.78.40.253 port 36216 ssh2 Jan 8 17:14:56 host sshd[25639]: Received disconnect from 5.78.40.253 port 36216:11: Bye Bye [preauth] Jan 8 17:14:56 host sshd[25639]: Disconnected from 5.78.40.253 port 36216 [preauth] Jan 8 17:14:57 host sshd[25652]: Invalid user vincent from 24.199.104.140 port 49910 Jan 8 17:14:57 host sshd[25652]: input_userauth_request: invalid user vincent [preauth] Jan 8 17:14:57 host sshd[25652]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:14:57 host sshd[25652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.140 Jan 8 17:14:59 host sshd[25652]: Failed password for invalid user vincent from 24.199.104.140 port 49910 ssh2 Jan 8 17:14:59 host sshd[25652]: Received disconnect from 24.199.104.140 port 49910:11: Bye Bye [preauth] Jan 8 17:14:59 host sshd[25652]: Disconnected from 24.199.104.140 port 49910 [preauth] Jan 8 17:15:26 host sshd[25758]: Invalid user sistemas from 198.46.215.53 port 41808 Jan 8 17:15:26 host sshd[25758]: input_userauth_request: invalid user sistemas [preauth] Jan 8 17:15:26 host sshd[25758]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:15:26 host sshd[25758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.215.53 Jan 8 17:15:27 host sshd[25758]: Failed password for invalid user sistemas from 198.46.215.53 port 41808 ssh2 Jan 8 17:15:27 host sshd[25758]: Received disconnect from 198.46.215.53 port 41808:11: Bye Bye [preauth] Jan 8 17:15:27 host sshd[25758]: Disconnected from 198.46.215.53 port 41808 [preauth] Jan 8 17:15:33 host sshd[25895]: Invalid user michael from 187.95.124.103 port 45877 Jan 8 17:15:33 host sshd[25895]: input_userauth_request: invalid user michael [preauth] Jan 8 17:15:33 host sshd[25895]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:15:33 host sshd[25895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.124.103 Jan 8 17:15:34 host sshd[25895]: Failed password for invalid user michael from 187.95.124.103 port 45877 ssh2 Jan 8 17:15:34 host sshd[25895]: Received disconnect from 187.95.124.103 port 45877:11: Bye Bye [preauth] Jan 8 17:15:34 host sshd[25895]: Disconnected from 187.95.124.103 port 45877 [preauth] Jan 8 17:15:57 host sshd[26045]: Invalid user qw from 192.3.253.7 port 51100 Jan 8 17:15:57 host sshd[26045]: input_userauth_request: invalid user qw [preauth] Jan 8 17:15:57 host sshd[26045]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:15:57 host sshd[26045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.253.7 Jan 8 17:15:59 host sshd[26045]: Failed password for invalid user qw from 192.3.253.7 port 51100 ssh2 Jan 8 17:16:06 host sshd[26112]: Invalid user ryan from 24.199.104.140 port 52450 Jan 8 17:16:06 host sshd[26112]: input_userauth_request: invalid user ryan [preauth] Jan 8 17:16:06 host sshd[26112]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:16:06 host sshd[26112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.140 Jan 8 17:16:08 host sshd[26112]: Failed password for invalid user ryan from 24.199.104.140 port 52450 ssh2 Jan 8 17:16:08 host sshd[26112]: Received disconnect from 24.199.104.140 port 52450:11: Bye Bye [preauth] Jan 8 17:16:08 host sshd[26112]: Disconnected from 24.199.104.140 port 52450 [preauth] Jan 8 17:16:18 host sshd[26183]: Invalid user kim from 43.156.13.3 port 49976 Jan 8 17:16:18 host sshd[26183]: input_userauth_request: invalid user kim [preauth] Jan 8 17:16:18 host sshd[26183]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:16:18 host sshd[26183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.13.3 Jan 8 17:16:20 host sshd[26183]: Failed password for invalid user kim from 43.156.13.3 port 49976 ssh2 Jan 8 17:16:20 host sshd[26183]: Received disconnect from 43.156.13.3 port 49976:11: Bye Bye [preauth] Jan 8 17:16:20 host sshd[26183]: Disconnected from 43.156.13.3 port 49976 [preauth] Jan 8 17:16:28 host sshd[26236]: Invalid user james from 5.78.40.253 port 56712 Jan 8 17:16:28 host sshd[26236]: input_userauth_request: invalid user james [preauth] Jan 8 17:16:28 host sshd[26236]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:16:28 host sshd[26236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.78.40.253 Jan 8 17:16:30 host sshd[26236]: Failed password for invalid user james from 5.78.40.253 port 56712 ssh2 Jan 8 17:16:31 host sshd[26236]: Received disconnect from 5.78.40.253 port 56712:11: Bye Bye [preauth] Jan 8 17:16:31 host sshd[26236]: Disconnected from 5.78.40.253 port 56712 [preauth] Jan 8 17:16:54 host sshd[26312]: Invalid user sistemas from 201.185.1.173 port 34468 Jan 8 17:16:54 host sshd[26312]: input_userauth_request: invalid user sistemas [preauth] Jan 8 17:16:54 host sshd[26312]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:16:54 host sshd[26312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.185.1.173 Jan 8 17:16:56 host sshd[26312]: Failed password for invalid user sistemas from 201.185.1.173 port 34468 ssh2 Jan 8 17:16:57 host sshd[26312]: Received disconnect from 201.185.1.173 port 34468:11: Bye Bye [preauth] Jan 8 17:16:57 host sshd[26312]: Disconnected from 201.185.1.173 port 34468 [preauth] Jan 8 17:17:08 host sshd[26360]: Invalid user sdbadmin from 187.95.124.103 port 57344 Jan 8 17:17:08 host sshd[26360]: input_userauth_request: invalid user sdbadmin [preauth] Jan 8 17:17:08 host sshd[26360]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:17:08 host sshd[26360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.124.103 Jan 8 17:17:10 host sshd[26360]: Failed password for invalid user sdbadmin from 187.95.124.103 port 57344 ssh2 Jan 8 17:17:10 host sshd[26360]: Received disconnect from 187.95.124.103 port 57344:11: Bye Bye [preauth] Jan 8 17:17:10 host sshd[26360]: Disconnected from 187.95.124.103 port 57344 [preauth] Jan 8 17:17:41 host sshd[26484]: Invalid user testuser from 5.78.40.253 port 35648 Jan 8 17:17:41 host sshd[26484]: input_userauth_request: invalid user testuser [preauth] Jan 8 17:17:41 host sshd[26484]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:17:41 host sshd[26484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.78.40.253 Jan 8 17:17:44 host sshd[26484]: Failed password for invalid user testuser from 5.78.40.253 port 35648 ssh2 Jan 8 17:17:56 host sshd[26559]: Invalid user nick from 43.156.13.3 port 49488 Jan 8 17:17:56 host sshd[26559]: input_userauth_request: invalid user nick [preauth] Jan 8 17:17:56 host sshd[26559]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:17:56 host sshd[26559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.13.3 Jan 8 17:17:57 host sshd[26559]: Failed password for invalid user nick from 43.156.13.3 port 49488 ssh2 Jan 8 17:17:57 host sshd[26559]: Received disconnect from 43.156.13.3 port 49488:11: Bye Bye [preauth] Jan 8 17:17:57 host sshd[26559]: Disconnected from 43.156.13.3 port 49488 [preauth] Jan 8 17:19:22 host sshd[26897]: Invalid user stage from 201.185.1.173 port 33972 Jan 8 17:19:22 host sshd[26897]: input_userauth_request: invalid user stage [preauth] Jan 8 17:19:22 host sshd[26897]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:19:22 host sshd[26897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.185.1.173 Jan 8 17:19:24 host sshd[26897]: Failed password for invalid user stage from 201.185.1.173 port 33972 ssh2 Jan 8 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=gifterman user-4=palco123 user-5=kottayamcalldriv user-6=phmetals user-7=wwwletsstalkfood user-8=straightcurve user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=woodpeck user-16=wwwkapin user-17=disposeat user-18=remysagr user-19=wwwkmaorg user-20=wwwrmswll user-21=wwwresourcehunte user-22=keralaholi user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 17:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O2gf9qrXjUqBvKmY.~ Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O2gf9qrXjUqBvKmY.~' Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O2gf9qrXjUqBvKmY.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 17:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 17:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 17:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 17:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 17:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 17:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 17:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 17:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 17:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 17:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 17:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 17:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 17:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 17:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 17:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 17:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 17:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 17:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 17:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 17:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 17:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 17:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 17:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 17:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 17:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 17:27:16 host sshd[28905]: Invalid user bugzilla from 35.234.63.166 port 55060 Jan 8 17:27:16 host sshd[28905]: input_userauth_request: invalid user bugzilla [preauth] Jan 8 17:27:16 host sshd[28905]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:27:16 host sshd[28905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.234.63.166 Jan 8 17:27:17 host sshd[28905]: Failed password for invalid user bugzilla from 35.234.63.166 port 55060 ssh2 Jan 8 17:27:17 host sshd[28905]: Received disconnect from 35.234.63.166 port 55060:11: Bye Bye [preauth] Jan 8 17:27:17 host sshd[28905]: Disconnected from 35.234.63.166 port 55060 [preauth] Jan 8 17:27:51 host sshd[29029]: Invalid user czerda from 187.234.71.14 port 54168 Jan 8 17:27:51 host sshd[29029]: input_userauth_request: invalid user czerda [preauth] Jan 8 17:27:51 host sshd[29029]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:27:51 host sshd[29029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.234.71.14 Jan 8 17:27:53 host sshd[29029]: Failed password for invalid user czerda from 187.234.71.14 port 54168 ssh2 Jan 8 17:27:53 host sshd[29029]: Received disconnect from 187.234.71.14 port 54168:11: Bye Bye [preauth] Jan 8 17:27:53 host sshd[29029]: Disconnected from 187.234.71.14 port 54168 [preauth] Jan 8 17:29:02 host sshd[29253]: Invalid user torrent from 201.184.50.251 port 47036 Jan 8 17:29:02 host sshd[29253]: input_userauth_request: invalid user torrent [preauth] Jan 8 17:29:02 host sshd[29253]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:29:02 host sshd[29253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.50.251 Jan 8 17:29:04 host sshd[29253]: Failed password for invalid user torrent from 201.184.50.251 port 47036 ssh2 Jan 8 17:29:04 host sshd[29253]: Received disconnect from 201.184.50.251 port 47036:11: Bye Bye [preauth] Jan 8 17:29:04 host sshd[29253]: Disconnected from 201.184.50.251 port 47036 [preauth] Jan 8 17:29:09 host sshd[29290]: Invalid user testing1 from 178.128.185.78 port 36978 Jan 8 17:29:09 host sshd[29290]: input_userauth_request: invalid user testing1 [preauth] Jan 8 17:29:09 host sshd[29290]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:29:09 host sshd[29290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.185.78 Jan 8 17:29:11 host sshd[29290]: Failed password for invalid user testing1 from 178.128.185.78 port 36978 ssh2 Jan 8 17:29:11 host sshd[29290]: Received disconnect from 178.128.185.78 port 36978:11: Bye Bye [preauth] Jan 8 17:29:11 host sshd[29290]: Disconnected from 178.128.185.78 port 36978 [preauth] Jan 8 17:29:15 host sshd[29311]: Invalid user edgar from 24.135.243.3 port 52922 Jan 8 17:29:15 host sshd[29311]: input_userauth_request: invalid user edgar [preauth] Jan 8 17:29:15 host sshd[29311]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:29:15 host sshd[29311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.135.243.3 Jan 8 17:29:16 host sshd[29311]: Failed password for invalid user edgar from 24.135.243.3 port 52922 ssh2 Jan 8 17:29:16 host sshd[29311]: Received disconnect from 24.135.243.3 port 52922:11: Bye Bye [preauth] Jan 8 17:29:16 host sshd[29311]: Disconnected from 24.135.243.3 port 52922 [preauth] Jan 8 17:30:37 host sshd[29596]: Invalid user testing1 from 195.239.91.210 port 50337 Jan 8 17:30:37 host sshd[29596]: input_userauth_request: invalid user testing1 [preauth] Jan 8 17:30:37 host sshd[29596]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:30:37 host sshd[29596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.91.210 Jan 8 17:30:39 host sshd[29596]: Failed password for invalid user testing1 from 195.239.91.210 port 50337 ssh2 Jan 8 17:30:39 host sshd[29596]: Received disconnect from 195.239.91.210 port 50337:11: Bye Bye [preauth] Jan 8 17:30:39 host sshd[29596]: Disconnected from 195.239.91.210 port 50337 [preauth] Jan 8 17:31:00 host sshd[29659]: Invalid user geoserver from 187.234.71.14 port 63847 Jan 8 17:31:00 host sshd[29659]: input_userauth_request: invalid user geoserver [preauth] Jan 8 17:31:00 host sshd[29659]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:31:00 host sshd[29659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.234.71.14 Jan 8 17:31:02 host sshd[29659]: Failed password for invalid user geoserver from 187.234.71.14 port 63847 ssh2 Jan 8 17:31:02 host sshd[29659]: Received disconnect from 187.234.71.14 port 63847:11: Bye Bye [preauth] Jan 8 17:31:02 host sshd[29659]: Disconnected from 187.234.71.14 port 63847 [preauth] Jan 8 17:31:45 host sshd[29804]: Invalid user daniel from 35.234.63.166 port 47564 Jan 8 17:31:45 host sshd[29804]: input_userauth_request: invalid user daniel [preauth] Jan 8 17:31:45 host sshd[29804]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:31:45 host sshd[29804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.234.63.166 Jan 8 17:31:47 host sshd[29804]: Failed password for invalid user daniel from 35.234.63.166 port 47564 ssh2 Jan 8 17:31:47 host sshd[29804]: Received disconnect from 35.234.63.166 port 47564:11: Bye Bye [preauth] Jan 8 17:31:47 host sshd[29804]: Disconnected from 35.234.63.166 port 47564 [preauth] Jan 8 17:32:04 host sshd[29952]: Invalid user free from 187.234.71.14 port 22180 Jan 8 17:32:04 host sshd[29952]: input_userauth_request: invalid user free [preauth] Jan 8 17:32:04 host sshd[29952]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:32:04 host sshd[29952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.234.71.14 Jan 8 17:32:06 host sshd[29952]: Failed password for invalid user free from 187.234.71.14 port 22180 ssh2 Jan 8 17:32:07 host sshd[29952]: Received disconnect from 187.234.71.14 port 22180:11: Bye Bye [preauth] Jan 8 17:32:07 host sshd[29952]: Disconnected from 187.234.71.14 port 22180 [preauth] Jan 8 17:32:13 host sshd[30007]: Invalid user wilson from 104.248.232.207 port 51874 Jan 8 17:32:13 host sshd[30007]: input_userauth_request: invalid user wilson [preauth] Jan 8 17:32:13 host sshd[30007]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:32:13 host sshd[30007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.232.207 Jan 8 17:32:15 host sshd[30007]: Failed password for invalid user wilson from 104.248.232.207 port 51874 ssh2 Jan 8 17:32:16 host sshd[30007]: Received disconnect from 104.248.232.207 port 51874:11: Bye Bye [preauth] Jan 8 17:32:16 host sshd[30007]: Disconnected from 104.248.232.207 port 51874 [preauth] Jan 8 17:33:06 host sshd[30154]: Invalid user testuser from 35.234.63.166 port 47208 Jan 8 17:33:06 host sshd[30154]: input_userauth_request: invalid user testuser [preauth] Jan 8 17:33:06 host sshd[30154]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:33:06 host sshd[30154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.234.63.166 Jan 8 17:33:08 host sshd[30154]: Failed password for invalid user testuser from 35.234.63.166 port 47208 ssh2 Jan 8 17:33:08 host sshd[30154]: Received disconnect from 35.234.63.166 port 47208:11: Bye Bye [preauth] Jan 8 17:33:08 host sshd[30154]: Disconnected from 35.234.63.166 port 47208 [preauth] Jan 8 17:33:12 host sshd[30207]: Invalid user mauricio from 23.97.229.237 port 44302 Jan 8 17:33:12 host sshd[30207]: input_userauth_request: invalid user mauricio [preauth] Jan 8 17:33:12 host sshd[30207]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:33:12 host sshd[30207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.229.237 Jan 8 17:33:15 host sshd[30207]: Failed password for invalid user mauricio from 23.97.229.237 port 44302 ssh2 Jan 8 17:33:15 host sshd[30207]: Received disconnect from 23.97.229.237 port 44302:11: Bye Bye [preauth] Jan 8 17:33:15 host sshd[30207]: Disconnected from 23.97.229.237 port 44302 [preauth] Jan 8 17:33:23 host sshd[30228]: Invalid user ben from 167.71.77.9 port 36132 Jan 8 17:33:23 host sshd[30228]: input_userauth_request: invalid user ben [preauth] Jan 8 17:33:23 host sshd[30228]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:33:23 host sshd[30228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.77.9 Jan 8 17:33:26 host sshd[30228]: Failed password for invalid user ben from 167.71.77.9 port 36132 ssh2 Jan 8 17:33:26 host sshd[30228]: Received disconnect from 167.71.77.9 port 36132:11: Bye Bye [preauth] Jan 8 17:33:26 host sshd[30228]: Disconnected from 167.71.77.9 port 36132 [preauth] Jan 8 17:34:37 host sshd[30505]: Invalid user servidor from 24.135.243.3 port 58760 Jan 8 17:34:37 host sshd[30505]: input_userauth_request: invalid user servidor [preauth] Jan 8 17:34:37 host sshd[30505]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:34:37 host sshd[30505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.135.243.3 Jan 8 17:34:37 host sshd[30503]: Invalid user amit from 201.184.50.251 port 47528 Jan 8 17:34:37 host sshd[30503]: input_userauth_request: invalid user amit [preauth] Jan 8 17:34:37 host sshd[30503]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:34:37 host sshd[30503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.50.251 Jan 8 17:34:39 host sshd[30505]: Failed password for invalid user servidor from 24.135.243.3 port 58760 ssh2 Jan 8 17:34:39 host sshd[30503]: Failed password for invalid user amit from 201.184.50.251 port 47528 ssh2 Jan 8 17:34:39 host sshd[30505]: Received disconnect from 24.135.243.3 port 58760:11: Bye Bye [preauth] Jan 8 17:34:39 host sshd[30505]: Disconnected from 24.135.243.3 port 58760 [preauth] Jan 8 17:34:39 host sshd[30503]: Received disconnect from 201.184.50.251 port 47528:11: Bye Bye [preauth] Jan 8 17:34:39 host sshd[30503]: Disconnected from 201.184.50.251 port 47528 [preauth] Jan 8 17:35:01 host sshd[30588]: Invalid user gold from 167.71.77.9 port 51522 Jan 8 17:35:01 host sshd[30588]: input_userauth_request: invalid user gold [preauth] Jan 8 17:35:01 host sshd[30588]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:35:01 host sshd[30588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.77.9 Jan 8 17:35:03 host sshd[30588]: Failed password for invalid user gold from 167.71.77.9 port 51522 ssh2 Jan 8 17:35:03 host sshd[30588]: Received disconnect from 167.71.77.9 port 51522:11: Bye Bye [preauth] Jan 8 17:35:03 host sshd[30588]: Disconnected from 167.71.77.9 port 51522 [preauth] Jan 8 17:35:09 host sshd[30646]: Invalid user bill from 104.248.232.207 port 35634 Jan 8 17:35:09 host sshd[30646]: input_userauth_request: invalid user bill [preauth] Jan 8 17:35:09 host sshd[30646]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:35:09 host sshd[30646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.232.207 Jan 8 17:35:11 host sshd[30646]: Failed password for invalid user bill from 104.248.232.207 port 35634 ssh2 Jan 8 17:35:11 host sshd[30646]: Received disconnect from 104.248.232.207 port 35634:11: Bye Bye [preauth] Jan 8 17:35:11 host sshd[30646]: Disconnected from 104.248.232.207 port 35634 [preauth] Jan 8 17:35:13 host sshd[30655]: Invalid user wilson from 178.128.185.78 port 50576 Jan 8 17:35:13 host sshd[30655]: input_userauth_request: invalid user wilson [preauth] Jan 8 17:35:13 host sshd[30655]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:35:13 host sshd[30655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.185.78 Jan 8 17:35:15 host sshd[30655]: Failed password for invalid user wilson from 178.128.185.78 port 50576 ssh2 Jan 8 17:35:15 host sshd[30655]: Received disconnect from 178.128.185.78 port 50576:11: Bye Bye [preauth] Jan 8 17:35:15 host sshd[30655]: Disconnected from 178.128.185.78 port 50576 [preauth] Jan 8 17:35:53 host sshd[30797]: User ftp from 201.184.50.251 not allowed because not listed in AllowUsers Jan 8 17:35:53 host sshd[30797]: input_userauth_request: invalid user ftp [preauth] Jan 8 17:35:53 host unix_chkpwd[30804]: password check failed for user (ftp) Jan 8 17:35:53 host sshd[30797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.50.251 user=ftp Jan 8 17:35:53 host sshd[30797]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 8 17:35:55 host sshd[30797]: Failed password for invalid user ftp from 201.184.50.251 port 46942 ssh2 Jan 8 17:36:02 host sshd[30858]: Invalid user nelson from 24.135.243.3 port 36620 Jan 8 17:36:02 host sshd[30858]: input_userauth_request: invalid user nelson [preauth] Jan 8 17:36:02 host sshd[30858]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:36:02 host sshd[30858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.135.243.3 Jan 8 17:36:04 host sshd[30858]: Failed password for invalid user nelson from 24.135.243.3 port 36620 ssh2 Jan 8 17:36:11 host sshd[30919]: Invalid user bill from 167.71.77.9 port 47118 Jan 8 17:36:11 host sshd[30919]: input_userauth_request: invalid user bill [preauth] Jan 8 17:36:11 host sshd[30919]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:36:11 host sshd[30919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.77.9 Jan 8 17:36:13 host sshd[30925]: Invalid user testuser from 104.248.232.207 port 35140 Jan 8 17:36:13 host sshd[30925]: input_userauth_request: invalid user testuser [preauth] Jan 8 17:36:13 host sshd[30925]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:36:13 host sshd[30925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.232.207 Jan 8 17:36:13 host sshd[30919]: Failed password for invalid user bill from 167.71.77.9 port 47118 ssh2 Jan 8 17:36:13 host sshd[30919]: Received disconnect from 167.71.77.9 port 47118:11: Bye Bye [preauth] Jan 8 17:36:13 host sshd[30919]: Disconnected from 167.71.77.9 port 47118 [preauth] Jan 8 17:36:15 host sshd[30925]: Failed password for invalid user testuser from 104.248.232.207 port 35140 ssh2 Jan 8 17:36:18 host sshd[31000]: Invalid user tableau from 178.128.185.78 port 35976 Jan 8 17:36:18 host sshd[31000]: input_userauth_request: invalid user tableau [preauth] Jan 8 17:36:18 host sshd[31000]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:36:18 host sshd[31000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.185.78 Jan 8 17:36:19 host sshd[31000]: Failed password for invalid user tableau from 178.128.185.78 port 35976 ssh2 Jan 8 17:36:33 host sshd[31095]: Invalid user gerrit from 195.239.91.210 port 51800 Jan 8 17:36:33 host sshd[31095]: input_userauth_request: invalid user gerrit [preauth] Jan 8 17:36:33 host sshd[31095]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:36:33 host sshd[31095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.91.210 Jan 8 17:36:35 host sshd[31095]: Failed password for invalid user gerrit from 195.239.91.210 port 51800 ssh2 Jan 8 17:36:36 host sshd[31095]: Received disconnect from 195.239.91.210 port 51800:11: Bye Bye [preauth] Jan 8 17:36:36 host sshd[31095]: Disconnected from 195.239.91.210 port 51800 [preauth] Jan 8 17:37:33 host sshd[31416]: Invalid user postgres from 23.97.229.237 port 36710 Jan 8 17:37:33 host sshd[31416]: input_userauth_request: invalid user postgres [preauth] Jan 8 17:37:33 host sshd[31416]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:37:33 host sshd[31416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.229.237 Jan 8 17:37:35 host sshd[31416]: Failed password for invalid user postgres from 23.97.229.237 port 36710 ssh2 Jan 8 17:37:35 host sshd[31416]: Received disconnect from 23.97.229.237 port 36710:11: Bye Bye [preauth] Jan 8 17:37:35 host sshd[31416]: Disconnected from 23.97.229.237 port 36710 [preauth] Jan 8 17:38:45 host sshd[31656]: Invalid user gerrit from 23.97.229.237 port 36098 Jan 8 17:38:45 host sshd[31656]: input_userauth_request: invalid user gerrit [preauth] Jan 8 17:38:45 host sshd[31656]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:38:45 host sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.229.237 Jan 8 17:38:46 host sshd[31656]: Failed password for invalid user gerrit from 23.97.229.237 port 36098 ssh2 Jan 8 17:38:46 host sshd[31656]: Received disconnect from 23.97.229.237 port 36098:11: Bye Bye [preauth] Jan 8 17:38:46 host sshd[31656]: Disconnected from 23.97.229.237 port 36098 [preauth] Jan 8 17:39:02 host sshd[31764]: Invalid user software from 195.239.91.210 port 45192 Jan 8 17:39:02 host sshd[31764]: input_userauth_request: invalid user software [preauth] Jan 8 17:39:02 host sshd[31764]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:39:02 host sshd[31764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.91.210 Jan 8 17:39:04 host sshd[31764]: Failed password for invalid user software from 195.239.91.210 port 45192 ssh2 Jan 8 17:42:11 host sshd[32666]: Invalid user bg from 194.110.203.109 port 49414 Jan 8 17:42:11 host sshd[32666]: input_userauth_request: invalid user bg [preauth] Jan 8 17:42:11 host sshd[32666]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:42:11 host sshd[32666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 17:42:13 host sshd[32666]: Failed password for invalid user bg from 194.110.203.109 port 49414 ssh2 Jan 8 17:42:16 host sshd[32666]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:42:18 host sshd[32666]: Failed password for invalid user bg from 194.110.203.109 port 49414 ssh2 Jan 8 17:42:21 host sshd[32666]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:42:24 host sshd[32666]: Failed password for invalid user bg from 194.110.203.109 port 49414 ssh2 Jan 8 17:42:27 host sshd[32666]: Connection closed by 194.110.203.109 port 49414 [preauth] Jan 8 17:42:27 host sshd[32666]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 17:43:49 host sshd[567]: Invalid user ricardo from 157.230.91.199 port 57398 Jan 8 17:43:49 host sshd[567]: input_userauth_request: invalid user ricardo [preauth] Jan 8 17:43:49 host sshd[567]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:43:49 host sshd[567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.199 Jan 8 17:43:52 host sshd[567]: Failed password for invalid user ricardo from 157.230.91.199 port 57398 ssh2 Jan 8 17:43:52 host sshd[567]: Received disconnect from 157.230.91.199 port 57398:11: Bye Bye [preauth] Jan 8 17:43:52 host sshd[567]: Disconnected from 157.230.91.199 port 57398 [preauth] Jan 8 17:45:27 host sshd[924]: Invalid user usuario from 162.240.11.182 port 40370 Jan 8 17:45:27 host sshd[924]: input_userauth_request: invalid user usuario [preauth] Jan 8 17:45:27 host sshd[924]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:45:27 host sshd[924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.240.11.182 Jan 8 17:45:29 host sshd[924]: Failed password for invalid user usuario from 162.240.11.182 port 40370 ssh2 Jan 8 17:45:30 host sshd[924]: Received disconnect from 162.240.11.182 port 40370:11: Bye Bye [preauth] Jan 8 17:45:30 host sshd[924]: Disconnected from 162.240.11.182 port 40370 [preauth] Jan 8 17:46:37 host sshd[1290]: Invalid user service from 194.169.175.102 port 64205 Jan 8 17:46:37 host sshd[1290]: input_userauth_request: invalid user service [preauth] Jan 8 17:46:37 host sshd[1290]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:46:37 host sshd[1290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 Jan 8 17:46:39 host sshd[1290]: Failed password for invalid user service from 194.169.175.102 port 64205 ssh2 Jan 8 17:46:39 host sshd[1290]: Received disconnect from 194.169.175.102 port 64205:11: Client disconnecting normally [preauth] Jan 8 17:46:39 host sshd[1290]: Disconnected from 194.169.175.102 port 64205 [preauth] Jan 8 17:48:00 host sshd[1563]: Invalid user postgres from 173.59.115.148 port 50812 Jan 8 17:48:00 host sshd[1563]: input_userauth_request: invalid user postgres [preauth] Jan 8 17:48:00 host sshd[1563]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:48:00 host sshd[1563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.59.115.148 Jan 8 17:48:02 host sshd[1563]: Failed password for invalid user postgres from 173.59.115.148 port 50812 ssh2 Jan 8 17:48:03 host sshd[1563]: Received disconnect from 173.59.115.148 port 50812:11: Bye Bye [preauth] Jan 8 17:48:03 host sshd[1563]: Disconnected from 173.59.115.148 port 50812 [preauth] Jan 8 17:48:10 host sshd[1607]: Invalid user .log from 143.244.158.100 port 54256 Jan 8 17:48:10 host sshd[1607]: input_userauth_request: invalid user .log [preauth] Jan 8 17:48:11 host sshd[1607]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:48:11 host sshd[1607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.158.100 Jan 8 17:48:13 host sshd[1607]: Failed password for invalid user .log from 143.244.158.100 port 54256 ssh2 Jan 8 17:48:13 host sshd[1607]: Received disconnect from 143.244.158.100 port 54256:11: Bye Bye [preauth] Jan 8 17:48:13 host sshd[1607]: Disconnected from 143.244.158.100 port 54256 [preauth] Jan 8 17:48:26 host sshd[1649]: Invalid user ricardo from 46.101.38.229 port 42220 Jan 8 17:48:26 host sshd[1649]: input_userauth_request: invalid user ricardo [preauth] Jan 8 17:48:26 host sshd[1649]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:48:26 host sshd[1649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.38.229 Jan 8 17:48:28 host sshd[1649]: Failed password for invalid user ricardo from 46.101.38.229 port 42220 ssh2 Jan 8 17:48:28 host sshd[1649]: Received disconnect from 46.101.38.229 port 42220:11: Bye Bye [preauth] Jan 8 17:48:28 host sshd[1649]: Disconnected from 46.101.38.229 port 42220 [preauth] Jan 8 17:49:24 host sshd[1875]: Invalid user crm from 157.230.91.199 port 36848 Jan 8 17:49:24 host sshd[1875]: input_userauth_request: invalid user crm [preauth] Jan 8 17:49:24 host sshd[1875]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:49:24 host sshd[1875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.199 Jan 8 17:49:27 host sshd[1875]: Failed password for invalid user crm from 157.230.91.199 port 36848 ssh2 Jan 8 17:49:27 host sshd[1875]: Received disconnect from 157.230.91.199 port 36848:11: Bye Bye [preauth] Jan 8 17:49:27 host sshd[1875]: Disconnected from 157.230.91.199 port 36848 [preauth] Jan 8 17:49:51 host sshd[1973]: Invalid user rock from 162.240.11.182 port 58978 Jan 8 17:49:51 host sshd[1973]: input_userauth_request: invalid user rock [preauth] Jan 8 17:49:51 host sshd[1973]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:49:51 host sshd[1973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.240.11.182 Jan 8 17:49:53 host sshd[1973]: Failed password for invalid user rock from 162.240.11.182 port 58978 ssh2 Jan 8 17:49:53 host sshd[1973]: Received disconnect from 162.240.11.182 port 58978:11: Bye Bye [preauth] Jan 8 17:49:53 host sshd[1973]: Disconnected from 162.240.11.182 port 58978 [preauth] Jan 8 17:50:32 host sshd[2139]: Invalid user hassan from 157.230.91.199 port 43858 Jan 8 17:50:32 host sshd[2139]: input_userauth_request: invalid user hassan [preauth] Jan 8 17:50:32 host sshd[2139]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:50:32 host sshd[2139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.199 Jan 8 17:50:34 host sshd[2139]: Failed password for invalid user hassan from 157.230.91.199 port 43858 ssh2 Jan 8 17:50:34 host sshd[2139]: Received disconnect from 157.230.91.199 port 43858:11: Bye Bye [preauth] Jan 8 17:50:34 host sshd[2139]: Disconnected from 157.230.91.199 port 43858 [preauth] Jan 8 17:51:12 host sshd[2316]: Invalid user edwin from 162.240.11.182 port 58560 Jan 8 17:51:12 host sshd[2316]: input_userauth_request: invalid user edwin [preauth] Jan 8 17:51:12 host sshd[2316]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:51:12 host sshd[2316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.240.11.182 Jan 8 17:51:14 host sshd[2316]: Failed password for invalid user edwin from 162.240.11.182 port 58560 ssh2 Jan 8 17:51:16 host sshd[2404]: Invalid user dl from 173.59.115.148 port 42101 Jan 8 17:51:16 host sshd[2404]: input_userauth_request: invalid user dl [preauth] Jan 8 17:51:16 host sshd[2404]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:51:16 host sshd[2404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.59.115.148 Jan 8 17:51:19 host sshd[2404]: Failed password for invalid user dl from 173.59.115.148 port 42101 ssh2 Jan 8 17:51:19 host sshd[2404]: Received disconnect from 173.59.115.148 port 42101:11: Bye Bye [preauth] Jan 8 17:51:19 host sshd[2404]: Disconnected from 173.59.115.148 port 42101 [preauth] Jan 8 17:51:38 host sshd[2562]: Invalid user guest from 46.101.38.229 port 47278 Jan 8 17:51:38 host sshd[2562]: input_userauth_request: invalid user guest [preauth] Jan 8 17:51:38 host sshd[2562]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:51:38 host sshd[2562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.38.229 Jan 8 17:51:40 host sshd[2562]: Failed password for invalid user guest from 46.101.38.229 port 47278 ssh2 Jan 8 17:51:40 host sshd[2562]: Received disconnect from 46.101.38.229 port 47278:11: Bye Bye [preauth] Jan 8 17:51:40 host sshd[2562]: Disconnected from 46.101.38.229 port 47278 [preauth] Jan 8 17:52:31 host sshd[2788]: Invalid user invitado from 173.59.115.148 port 55503 Jan 8 17:52:31 host sshd[2788]: input_userauth_request: invalid user invitado [preauth] Jan 8 17:52:31 host sshd[2788]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:52:31 host sshd[2788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.59.115.148 Jan 8 17:52:33 host sshd[2788]: Failed password for invalid user invitado from 173.59.115.148 port 55503 ssh2 Jan 8 17:52:33 host sshd[2788]: Received disconnect from 173.59.115.148 port 55503:11: Bye Bye [preauth] Jan 8 17:52:33 host sshd[2788]: Disconnected from 173.59.115.148 port 55503 [preauth] Jan 8 17:53:00 host sshd[2914]: Invalid user platform from 46.101.38.229 port 42752 Jan 8 17:53:00 host sshd[2914]: input_userauth_request: invalid user platform [preauth] Jan 8 17:53:00 host sshd[2914]: pam_unix(sshd:auth): check pass; user unknown Jan 8 17:53:00 host sshd[2914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.38.229 Jan 8 17:53:02 host sshd[2914]: Failed password for invalid user platform from 46.101.38.229 port 42752 ssh2 Jan 8 17:53:02 host sshd[2914]: Received disconnect from 46.101.38.229 port 42752:11: Bye Bye [preauth] Jan 8 17:53:02 host sshd[2914]: Disconnected from 46.101.38.229 port 42752 [preauth] Jan 8 18:08:30 host sshd[5723]: Invalid user admin from 73.176.112.15 port 42684 Jan 8 18:08:30 host sshd[5723]: input_userauth_request: invalid user admin [preauth] Jan 8 18:08:30 host sshd[5723]: Failed none for invalid user admin from 73.176.112.15 port 42684 ssh2 Jan 8 18:08:34 host sshd[5723]: pam_unix(sshd:auth): check pass; user unknown Jan 8 18:08:34 host sshd[5723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.176.112.15 Jan 8 18:08:36 host sshd[5723]: Failed password for invalid user admin from 73.176.112.15 port 42684 ssh2 Jan 8 18:08:37 host sshd[5723]: pam_unix(sshd:auth): check pass; user unknown Jan 8 18:08:39 host sshd[5723]: Failed password for invalid user admin from 73.176.112.15 port 42684 ssh2 Jan 8 18:08:40 host sshd[5723]: pam_unix(sshd:auth): check pass; user unknown Jan 8 18:08:42 host sshd[5723]: Failed password for invalid user admin from 73.176.112.15 port 42684 ssh2 Jan 8 18:08:43 host sshd[5723]: pam_unix(sshd:auth): check pass; user unknown Jan 8 18:08:45 host sshd[5723]: Failed password for invalid user admin from 73.176.112.15 port 42684 ssh2 Jan 8 18:08:47 host sshd[5723]: pam_unix(sshd:auth): check pass; user unknown Jan 8 18:08:49 host sshd[5723]: Failed password for invalid user admin from 73.176.112.15 port 42684 ssh2 Jan 8 18:08:49 host sshd[5723]: error: maximum authentication attempts exceeded for invalid user admin from 73.176.112.15 port 42684 ssh2 [preauth] Jan 8 18:08:49 host sshd[5723]: Disconnecting: Too many authentication failures [preauth] Jan 8 18:08:49 host sshd[5723]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.176.112.15 Jan 8 18:08:49 host sshd[5723]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 8 18:09:25 host sshd[5921]: Connection closed by 45.79.181.223 port 61392 [preauth] Jan 8 18:09:28 host sshd[5931]: Connection closed by 45.79.181.223 port 61394 [preauth] Jan 8 18:09:32 host sshd[5959]: Connection closed by 45.79.181.223 port 50870 [preauth] Jan 8 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=wwwrmswll user-7=wwwresourcehunte user-8=keralaholi user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=gifterman user-24=palco123 user-25=kottayamcalldriv user-26=phmetals user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 18:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oyT5aAtI1wVahBiq.~ Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oyT5aAtI1wVahBiq.~' Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oyT5aAtI1wVahBiq.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 18:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 18:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 18:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 18:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 18:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 18:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 18:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 18:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 18:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 18:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 18:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 18:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 18:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 18:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 18:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 18:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 18:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 18:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 18:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 18:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 18:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 18:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 18:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 18:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 19:05:57 host sshd[13732]: Did not receive identification string from 8.219.76.192 port 61000 Jan 8 19:12:37 host sshd[14775]: Invalid user development from 31.210.211.114 port 41993 Jan 8 19:12:37 host sshd[14775]: input_userauth_request: invalid user development [preauth] Jan 8 19:12:37 host sshd[14775]: pam_unix(sshd:auth): check pass; user unknown Jan 8 19:12:37 host sshd[14775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.211.114 Jan 8 19:12:39 host sshd[14775]: Failed password for invalid user development from 31.210.211.114 port 41993 ssh2 Jan 8 19:12:39 host sshd[14775]: Received disconnect from 31.210.211.114 port 41993:11: Bye Bye [preauth] Jan 8 19:12:39 host sshd[14775]: Disconnected from 31.210.211.114 port 41993 [preauth] Jan 8 19:17:59 host sshd[15715]: Invalid user rocky from 31.210.211.114 port 54145 Jan 8 19:17:59 host sshd[15715]: input_userauth_request: invalid user rocky [preauth] Jan 8 19:17:59 host sshd[15715]: pam_unix(sshd:auth): check pass; user unknown Jan 8 19:17:59 host sshd[15715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.211.114 Jan 8 19:18:01 host sshd[15715]: Failed password for invalid user rocky from 31.210.211.114 port 54145 ssh2 Jan 8 19:18:01 host sshd[15715]: Received disconnect from 31.210.211.114 port 54145:11: Bye Bye [preauth] Jan 8 19:18:01 host sshd[15715]: Disconnected from 31.210.211.114 port 54145 [preauth] Jan 8 19:19:21 host sshd[15896]: Invalid user evan from 31.210.211.114 port 48235 Jan 8 19:19:21 host sshd[15896]: input_userauth_request: invalid user evan [preauth] Jan 8 19:19:21 host sshd[15896]: pam_unix(sshd:auth): check pass; user unknown Jan 8 19:19:21 host sshd[15896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.211.114 Jan 8 19:19:23 host sshd[15896]: Failed password for invalid user evan from 31.210.211.114 port 48235 ssh2 Jan 8 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 19:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=mrsclean user-21=wwwnexidigital user-22=wwwkmaorg user-23=disposeat user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 19:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mOJlbOZ9ZfVdMJB0.~ Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mOJlbOZ9ZfVdMJB0.~' Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mOJlbOZ9ZfVdMJB0.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 19:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 19:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 19:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 19:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 19:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 19:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 19:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 19:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 19:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 19:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 19:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 19:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 19:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 19:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 19:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 19:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 19:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 19:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 19:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 19:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 19:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 19:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 19:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 19:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 19:32:46 host sshd[18014]: Did not receive identification string from 50.31.21.7 port 51122 Jan 8 19:34:46 host sshd[18241]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 8 19:34:46 host sshd[18241]: input_userauth_request: invalid user root [preauth] Jan 8 19:34:47 host unix_chkpwd[18244]: password check failed for user (root) Jan 8 19:34:47 host sshd[18241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 8 19:34:47 host sshd[18241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 19:34:48 host sshd[18241]: Failed password for invalid user root from 195.226.194.142 port 38984 ssh2 Jan 8 19:34:48 host sshd[18241]: Received disconnect from 195.226.194.142 port 38984:11: Bye Bye [preauth] Jan 8 19:34:48 host sshd[18241]: Disconnected from 195.226.194.142 port 38984 [preauth] Jan 8 19:34:52 host sshd[18254]: Connection closed by 50.31.21.7 port 41904 [preauth] Jan 8 19:45:57 host sshd[20157]: Did not receive identification string from 51.38.56.130 port 49166 Jan 8 19:47:36 host sshd[20348]: Invalid user bh from 194.110.203.109 port 43498 Jan 8 19:47:36 host sshd[20348]: input_userauth_request: invalid user bh [preauth] Jan 8 19:47:36 host sshd[20348]: pam_unix(sshd:auth): check pass; user unknown Jan 8 19:47:36 host sshd[20348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 19:47:38 host sshd[20348]: Failed password for invalid user bh from 194.110.203.109 port 43498 ssh2 Jan 8 19:47:41 host sshd[20348]: pam_unix(sshd:auth): check pass; user unknown Jan 8 19:47:43 host sshd[20348]: Failed password for invalid user bh from 194.110.203.109 port 43498 ssh2 Jan 8 19:47:46 host sshd[20348]: pam_unix(sshd:auth): check pass; user unknown Jan 8 19:47:47 host sshd[20348]: Failed password for invalid user bh from 194.110.203.109 port 43498 ssh2 Jan 8 19:47:51 host sshd[20348]: Connection closed by 194.110.203.109 port 43498 [preauth] Jan 8 19:47:51 host sshd[20348]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 20:04:00 host sshd[22555]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 8 20:04:00 host sshd[22555]: input_userauth_request: invalid user root [preauth] Jan 8 20:04:00 host unix_chkpwd[22557]: password check failed for user (root) Jan 8 20:04:00 host sshd[22555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 8 20:04:00 host sshd[22555]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 20:04:02 host sshd[22555]: Failed password for invalid user root from 195.226.194.142 port 47776 ssh2 Jan 8 20:04:02 host sshd[22555]: Received disconnect from 195.226.194.142 port 47776:11: Bye Bye [preauth] Jan 8 20:04:02 host sshd[22555]: Disconnected from 195.226.194.142 port 47776 [preauth] Jan 8 20:09:11 host sshd[23363]: Invalid user user from 70.176.96.74 port 38185 Jan 8 20:09:11 host sshd[23363]: input_userauth_request: invalid user user [preauth] Jan 8 20:09:11 host sshd[23363]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:09:11 host sshd[23363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.176.96.74 Jan 8 20:09:13 host sshd[23363]: Failed password for invalid user user from 70.176.96.74 port 38185 ssh2 Jan 8 20:09:13 host sshd[23363]: Received disconnect from 70.176.96.74 port 38185:11: Bye Bye [preauth] Jan 8 20:09:13 host sshd[23363]: Disconnected from 70.176.96.74 port 38185 [preauth] Jan 8 20:09:15 host sshd[23369]: Invalid user apc from 70.176.96.74 port 38332 Jan 8 20:09:15 host sshd[23369]: input_userauth_request: invalid user apc [preauth] Jan 8 20:09:15 host sshd[23369]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:09:15 host sshd[23369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.176.96.74 Jan 8 20:09:17 host sshd[23369]: Failed password for invalid user apc from 70.176.96.74 port 38332 ssh2 Jan 8 20:09:17 host sshd[23369]: Received disconnect from 70.176.96.74 port 38332:11: Bye Bye [preauth] Jan 8 20:09:17 host sshd[23369]: Disconnected from 70.176.96.74 port 38332 [preauth] Jan 8 20:09:19 host sshd[23374]: Invalid user admin from 70.176.96.74 port 38361 Jan 8 20:09:19 host sshd[23374]: input_userauth_request: invalid user admin [preauth] Jan 8 20:09:19 host sshd[23374]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:09:19 host sshd[23374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.176.96.74 Jan 8 20:09:22 host sshd[23374]: Failed password for invalid user admin from 70.176.96.74 port 38361 ssh2 Jan 8 20:09:22 host sshd[23374]: Received disconnect from 70.176.96.74 port 38361:11: Bye Bye [preauth] Jan 8 20:09:22 host sshd[23374]: Disconnected from 70.176.96.74 port 38361 [preauth] Jan 8 20:09:24 host sshd[23381]: User root from 70.176.96.74 not allowed because not listed in AllowUsers Jan 8 20:09:24 host sshd[23381]: input_userauth_request: invalid user root [preauth] Jan 8 20:09:24 host unix_chkpwd[23402]: password check failed for user (root) Jan 8 20:09:24 host sshd[23381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.176.96.74 user=root Jan 8 20:09:24 host sshd[23381]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 20:09:26 host sshd[23381]: Failed password for invalid user root from 70.176.96.74 port 38494 ssh2 Jan 8 20:16:13 host sshd[24379]: Invalid user testuser from 198.98.58.79 port 41756 Jan 8 20:16:13 host sshd[24379]: input_userauth_request: invalid user testuser [preauth] Jan 8 20:16:13 host sshd[24379]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:16:13 host sshd[24379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.58.79 Jan 8 20:16:16 host sshd[24379]: Failed password for invalid user testuser from 198.98.58.79 port 41756 ssh2 Jan 8 20:16:16 host sshd[24379]: Received disconnect from 198.98.58.79 port 41756:11: Bye Bye [preauth] Jan 8 20:16:16 host sshd[24379]: Disconnected from 198.98.58.79 port 41756 [preauth] Jan 8 20:18:36 host sshd[24633]: Invalid user suporte from 179.108.181.161 port 40314 Jan 8 20:18:36 host sshd[24633]: input_userauth_request: invalid user suporte [preauth] Jan 8 20:18:36 host sshd[24633]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:18:36 host sshd[24633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.108.181.161 Jan 8 20:18:37 host sshd[24633]: Failed password for invalid user suporte from 179.108.181.161 port 40314 ssh2 Jan 8 20:18:37 host sshd[24633]: Received disconnect from 179.108.181.161 port 40314:11: Bye Bye [preauth] Jan 8 20:18:37 host sshd[24633]: Disconnected from 179.108.181.161 port 40314 [preauth] Jan 8 20:19:12 host sshd[24704]: Invalid user alvaro from 187.95.160.53 port 33332 Jan 8 20:19:12 host sshd[24704]: input_userauth_request: invalid user alvaro [preauth] Jan 8 20:19:12 host sshd[24704]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:19:12 host sshd[24704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.160.53 Jan 8 20:19:14 host sshd[24708]: Invalid user thiago from 161.35.0.70 port 53130 Jan 8 20:19:14 host sshd[24708]: input_userauth_request: invalid user thiago [preauth] Jan 8 20:19:14 host sshd[24708]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:19:14 host sshd[24708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.0.70 Jan 8 20:19:14 host sshd[24704]: Failed password for invalid user alvaro from 187.95.160.53 port 33332 ssh2 Jan 8 20:19:15 host sshd[24704]: Received disconnect from 187.95.160.53 port 33332:11: Bye Bye [preauth] Jan 8 20:19:15 host sshd[24704]: Disconnected from 187.95.160.53 port 33332 [preauth] Jan 8 20:19:16 host sshd[24708]: Failed password for invalid user thiago from 161.35.0.70 port 53130 ssh2 Jan 8 20:19:16 host sshd[24708]: Received disconnect from 161.35.0.70 port 53130:11: Bye Bye [preauth] Jan 8 20:19:16 host sshd[24708]: Disconnected from 161.35.0.70 port 53130 [preauth] Jan 8 20:19:43 host sshd[24758]: Invalid user backuppc from 179.99.202.158 port 56612 Jan 8 20:19:43 host sshd[24758]: input_userauth_request: invalid user backuppc [preauth] Jan 8 20:19:43 host sshd[24758]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:19:43 host sshd[24758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.99.202.158 Jan 8 20:19:45 host sshd[24758]: Failed password for invalid user backuppc from 179.99.202.158 port 56612 ssh2 Jan 8 20:19:45 host sshd[24758]: Received disconnect from 179.99.202.158 port 56612:11: Bye Bye [preauth] Jan 8 20:19:45 host sshd[24758]: Disconnected from 179.99.202.158 port 56612 [preauth] Jan 8 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=remysagr user-9=wwwkmaorg user-10=mrsclean user-11=wwwnexidigital user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=straightcurve user-17=wwwletsstalkfood user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=cochintaxi user-24=wwwkaretakers user-25=wwwrmswll user-26=keralaholi user-27=wwwresourcehunte user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 20:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-dBjAaNOQJ9Or5QqK.~ Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-dBjAaNOQJ9Or5QqK.~' Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-dBjAaNOQJ9Or5QqK.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 20:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 20:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 20:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 20:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 20:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 20:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 20:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 20:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 20:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 20:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 20:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 20:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 20:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 20:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 20:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 20:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 20:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 20:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 20:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 20:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 20:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 20:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 20:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 20:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 20:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 20:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 20:22:48 host sshd[25431]: Invalid user seba from 198.98.58.79 port 46010 Jan 8 20:22:48 host sshd[25431]: input_userauth_request: invalid user seba [preauth] Jan 8 20:22:48 host sshd[25431]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:22:48 host sshd[25431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.58.79 Jan 8 20:22:50 host sshd[25434]: Invalid user peng from 161.35.0.70 port 39068 Jan 8 20:22:50 host sshd[25434]: input_userauth_request: invalid user peng [preauth] Jan 8 20:22:50 host sshd[25434]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:22:50 host sshd[25434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.0.70 Jan 8 20:22:50 host sshd[25431]: Failed password for invalid user seba from 198.98.58.79 port 46010 ssh2 Jan 8 20:22:50 host sshd[25431]: Received disconnect from 198.98.58.79 port 46010:11: Bye Bye [preauth] Jan 8 20:22:50 host sshd[25431]: Disconnected from 198.98.58.79 port 46010 [preauth] Jan 8 20:22:52 host sshd[25434]: Failed password for invalid user peng from 161.35.0.70 port 39068 ssh2 Jan 8 20:22:52 host sshd[25434]: Received disconnect from 161.35.0.70 port 39068:11: Bye Bye [preauth] Jan 8 20:22:52 host sshd[25434]: Disconnected from 161.35.0.70 port 39068 [preauth] Jan 8 20:23:04 host sshd[25466]: Invalid user admin from 187.95.160.53 port 56938 Jan 8 20:23:04 host sshd[25466]: input_userauth_request: invalid user admin [preauth] Jan 8 20:23:04 host sshd[25466]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:23:04 host sshd[25466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.160.53 Jan 8 20:23:04 host sshd[25469]: Invalid user testing from 179.108.181.161 port 55430 Jan 8 20:23:04 host sshd[25469]: input_userauth_request: invalid user testing [preauth] Jan 8 20:23:04 host sshd[25469]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:23:04 host sshd[25469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.108.181.161 Jan 8 20:23:05 host sshd[25466]: Failed password for invalid user admin from 187.95.160.53 port 56938 ssh2 Jan 8 20:23:06 host sshd[25466]: Received disconnect from 187.95.160.53 port 56938:11: Bye Bye [preauth] Jan 8 20:23:06 host sshd[25466]: Disconnected from 187.95.160.53 port 56938 [preauth] Jan 8 20:23:06 host sshd[25469]: Failed password for invalid user testing from 179.108.181.161 port 55430 ssh2 Jan 8 20:23:06 host sshd[25469]: Received disconnect from 179.108.181.161 port 55430:11: Bye Bye [preauth] Jan 8 20:23:06 host sshd[25469]: Disconnected from 179.108.181.161 port 55430 [preauth] Jan 8 20:23:54 host sshd[25548]: Invalid user sonic from 198.98.58.79 port 40900 Jan 8 20:23:54 host sshd[25548]: input_userauth_request: invalid user sonic [preauth] Jan 8 20:23:54 host sshd[25548]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:23:54 host sshd[25548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.58.79 Jan 8 20:23:56 host sshd[25548]: Failed password for invalid user sonic from 198.98.58.79 port 40900 ssh2 Jan 8 20:23:56 host sshd[25548]: Received disconnect from 198.98.58.79 port 40900:11: Bye Bye [preauth] Jan 8 20:23:56 host sshd[25548]: Disconnected from 198.98.58.79 port 40900 [preauth] Jan 8 20:24:02 host sshd[25604]: Invalid user gustavo from 161.35.0.70 port 38420 Jan 8 20:24:02 host sshd[25604]: input_userauth_request: invalid user gustavo [preauth] Jan 8 20:24:02 host sshd[25604]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:24:02 host sshd[25604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.0.70 Jan 8 20:24:05 host sshd[25604]: Failed password for invalid user gustavo from 161.35.0.70 port 38420 ssh2 Jan 8 20:24:30 host sshd[25683]: Invalid user finance from 179.108.181.161 port 50344 Jan 8 20:24:30 host sshd[25683]: input_userauth_request: invalid user finance [preauth] Jan 8 20:24:30 host sshd[25683]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:24:30 host sshd[25683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.108.181.161 Jan 8 20:24:32 host sshd[25683]: Failed password for invalid user finance from 179.108.181.161 port 50344 ssh2 Jan 8 20:24:32 host sshd[25683]: Received disconnect from 179.108.181.161 port 50344:11: Bye Bye [preauth] Jan 8 20:24:32 host sshd[25683]: Disconnected from 179.108.181.161 port 50344 [preauth] Jan 8 20:24:36 host sshd[25690]: Invalid user sonic from 187.95.160.53 port 53962 Jan 8 20:24:36 host sshd[25690]: input_userauth_request: invalid user sonic [preauth] Jan 8 20:24:36 host sshd[25690]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:24:36 host sshd[25690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.160.53 Jan 8 20:24:37 host sshd[25690]: Failed password for invalid user sonic from 187.95.160.53 port 53962 ssh2 Jan 8 20:24:38 host sshd[25690]: Received disconnect from 187.95.160.53 port 53962:11: Bye Bye [preauth] Jan 8 20:24:38 host sshd[25690]: Disconnected from 187.95.160.53 port 53962 [preauth] Jan 8 20:25:43 host sshd[25879]: Invalid user testing from 179.99.202.158 port 45084 Jan 8 20:25:43 host sshd[25879]: input_userauth_request: invalid user testing [preauth] Jan 8 20:25:43 host sshd[25879]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:25:43 host sshd[25879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.99.202.158 Jan 8 20:25:46 host sshd[25879]: Failed password for invalid user testing from 179.99.202.158 port 45084 ssh2 Jan 8 20:25:46 host sshd[25879]: Received disconnect from 179.99.202.158 port 45084:11: Bye Bye [preauth] Jan 8 20:25:46 host sshd[25879]: Disconnected from 179.99.202.158 port 45084 [preauth] Jan 8 20:27:35 host sshd[26084]: Invalid user bot1 from 179.99.202.158 port 41936 Jan 8 20:27:35 host sshd[26084]: input_userauth_request: invalid user bot1 [preauth] Jan 8 20:27:35 host sshd[26084]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:27:35 host sshd[26084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.99.202.158 Jan 8 20:27:37 host sshd[26084]: Failed password for invalid user bot1 from 179.99.202.158 port 41936 ssh2 Jan 8 20:27:38 host sshd[26084]: Received disconnect from 179.99.202.158 port 41936:11: Bye Bye [preauth] Jan 8 20:27:38 host sshd[26084]: Disconnected from 179.99.202.158 port 41936 [preauth] Jan 8 20:37:08 host sshd[27418]: Invalid user vsftp from 49.249.83.115 port 48531 Jan 8 20:37:08 host sshd[27418]: input_userauth_request: invalid user vsftp [preauth] Jan 8 20:37:08 host sshd[27418]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:37:08 host sshd[27418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.249.83.115 Jan 8 20:37:11 host sshd[27418]: Failed password for invalid user vsftp from 49.249.83.115 port 48531 ssh2 Jan 8 20:37:11 host sshd[27418]: Received disconnect from 49.249.83.115 port 48531:11: Bye Bye [preauth] Jan 8 20:37:11 host sshd[27418]: Disconnected from 49.249.83.115 port 48531 [preauth] Jan 8 20:39:20 host sshd[27769]: Invalid user harry from 107.189.30.59 port 36032 Jan 8 20:39:20 host sshd[27769]: input_userauth_request: invalid user harry [preauth] Jan 8 20:39:20 host sshd[27769]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:39:20 host sshd[27769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 8 20:39:21 host sshd[27769]: Failed password for invalid user harry from 107.189.30.59 port 36032 ssh2 Jan 8 20:39:22 host sshd[27769]: Connection closed by 107.189.30.59 port 36032 [preauth] Jan 8 20:39:36 host sshd[27830]: Invalid user leo from 142.93.100.226 port 42264 Jan 8 20:39:36 host sshd[27830]: input_userauth_request: invalid user leo [preauth] Jan 8 20:39:36 host sshd[27830]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:39:36 host sshd[27830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.100.226 Jan 8 20:39:37 host sshd[27830]: Failed password for invalid user leo from 142.93.100.226 port 42264 ssh2 Jan 8 20:39:37 host sshd[27830]: Received disconnect from 142.93.100.226 port 42264:11: Bye Bye [preauth] Jan 8 20:39:37 host sshd[27830]: Disconnected from 142.93.100.226 port 42264 [preauth] Jan 8 20:39:41 host sshd[27848]: Invalid user contador from 49.249.83.115 port 61659 Jan 8 20:39:41 host sshd[27848]: input_userauth_request: invalid user contador [preauth] Jan 8 20:39:41 host sshd[27848]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:39:41 host sshd[27848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.249.83.115 Jan 8 20:39:42 host sshd[27848]: Failed password for invalid user contador from 49.249.83.115 port 61659 ssh2 Jan 8 20:39:42 host sshd[27848]: Received disconnect from 49.249.83.115 port 61659:11: Bye Bye [preauth] Jan 8 20:39:42 host sshd[27848]: Disconnected from 49.249.83.115 port 61659 [preauth] Jan 8 20:39:50 host sshd[27863]: Invalid user lixuan from 37.187.112.193 port 55750 Jan 8 20:39:50 host sshd[27863]: input_userauth_request: invalid user lixuan [preauth] Jan 8 20:39:50 host sshd[27863]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:39:50 host sshd[27863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.112.193 Jan 8 20:39:51 host sshd[27863]: Failed password for invalid user lixuan from 37.187.112.193 port 55750 ssh2 Jan 8 20:39:51 host sshd[27863]: Received disconnect from 37.187.112.193 port 55750:11: Bye Bye [preauth] Jan 8 20:39:51 host sshd[27863]: Disconnected from 37.187.112.193 port 55750 [preauth] Jan 8 20:40:18 host sshd[27928]: Invalid user admin from 203.129.220.82 port 46574 Jan 8 20:40:18 host sshd[27928]: input_userauth_request: invalid user admin [preauth] Jan 8 20:40:18 host sshd[27928]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:40:18 host sshd[27928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.220.82 Jan 8 20:40:19 host sshd[27928]: Failed password for invalid user admin from 203.129.220.82 port 46574 ssh2 Jan 8 20:40:19 host sshd[27928]: Received disconnect from 203.129.220.82 port 46574:11: Bye Bye [preauth] Jan 8 20:40:19 host sshd[27928]: Disconnected from 203.129.220.82 port 46574 [preauth] Jan 8 20:40:24 host sshd[27936]: Invalid user demo from 49.249.83.115 port 42385 Jan 8 20:40:24 host sshd[27936]: input_userauth_request: invalid user demo [preauth] Jan 8 20:40:24 host sshd[27936]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:40:24 host sshd[27936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.249.83.115 Jan 8 20:40:26 host sshd[27936]: Failed password for invalid user demo from 49.249.83.115 port 42385 ssh2 Jan 8 20:41:13 host sshd[28070]: Invalid user demo from 46.8.220.111 port 45348 Jan 8 20:41:13 host sshd[28070]: input_userauth_request: invalid user demo [preauth] Jan 8 20:41:13 host sshd[28070]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:41:13 host sshd[28070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.8.220.111 Jan 8 20:41:16 host sshd[28070]: Failed password for invalid user demo from 46.8.220.111 port 45348 ssh2 Jan 8 20:41:16 host sshd[28070]: Received disconnect from 46.8.220.111 port 45348:11: Bye Bye [preauth] Jan 8 20:41:16 host sshd[28070]: Disconnected from 46.8.220.111 port 45348 [preauth] Jan 8 20:41:19 host sshd[28079]: Invalid user recovery from 40.127.173.225 port 42244 Jan 8 20:41:19 host sshd[28079]: input_userauth_request: invalid user recovery [preauth] Jan 8 20:41:19 host sshd[28079]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:41:19 host sshd[28079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.127.173.225 Jan 8 20:41:21 host sshd[28079]: Failed password for invalid user recovery from 40.127.173.225 port 42244 ssh2 Jan 8 20:41:21 host sshd[28079]: Received disconnect from 40.127.173.225 port 42244:11: Bye Bye [preauth] Jan 8 20:41:21 host sshd[28079]: Disconnected from 40.127.173.225 port 42244 [preauth] Jan 8 20:41:35 host sshd[28118]: Invalid user master from 132.148.75.52 port 60040 Jan 8 20:41:35 host sshd[28118]: input_userauth_request: invalid user master [preauth] Jan 8 20:41:35 host sshd[28118]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:41:35 host sshd[28118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.75.52 Jan 8 20:41:37 host sshd[28118]: Failed password for invalid user master from 132.148.75.52 port 60040 ssh2 Jan 8 20:41:37 host sshd[28118]: Received disconnect from 132.148.75.52 port 60040:11: Bye Bye [preauth] Jan 8 20:41:37 host sshd[28118]: Disconnected from 132.148.75.52 port 60040 [preauth] Jan 8 20:43:08 host sshd[28265]: Invalid user song from 132.148.75.52 port 36594 Jan 8 20:43:08 host sshd[28265]: input_userauth_request: invalid user song [preauth] Jan 8 20:43:08 host sshd[28265]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:43:08 host sshd[28265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.75.52 Jan 8 20:43:10 host sshd[28265]: Failed password for invalid user song from 132.148.75.52 port 36594 ssh2 Jan 8 20:43:10 host sshd[28265]: Received disconnect from 132.148.75.52 port 36594:11: Bye Bye [preauth] Jan 8 20:43:10 host sshd[28265]: Disconnected from 132.148.75.52 port 36594 [preauth] Jan 8 20:43:13 host sshd[28278]: User mysql from 43.153.110.124 not allowed because not listed in AllowUsers Jan 8 20:43:13 host sshd[28278]: input_userauth_request: invalid user mysql [preauth] Jan 8 20:43:13 host unix_chkpwd[28281]: password check failed for user (mysql) Jan 8 20:43:13 host sshd[28278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.110.124 user=mysql Jan 8 20:43:13 host sshd[28278]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 8 20:43:16 host sshd[28278]: Failed password for invalid user mysql from 43.153.110.124 port 51660 ssh2 Jan 8 20:43:16 host sshd[28278]: Received disconnect from 43.153.110.124 port 51660:11: Bye Bye [preauth] Jan 8 20:43:16 host sshd[28278]: Disconnected from 43.153.110.124 port 51660 [preauth] Jan 8 20:43:23 host sshd[28295]: Invalid user xia from 37.187.112.193 port 44850 Jan 8 20:43:23 host sshd[28295]: input_userauth_request: invalid user xia [preauth] Jan 8 20:43:23 host sshd[28295]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:43:23 host sshd[28295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.112.193 Jan 8 20:43:26 host sshd[28295]: Failed password for invalid user xia from 37.187.112.193 port 44850 ssh2 Jan 8 20:43:26 host sshd[28295]: Received disconnect from 37.187.112.193 port 44850:11: Bye Bye [preauth] Jan 8 20:43:26 host sshd[28295]: Disconnected from 37.187.112.193 port 44850 [preauth] Jan 8 20:43:48 host sshd[28351]: Invalid user jarservice from 203.129.220.82 port 37106 Jan 8 20:43:48 host sshd[28351]: input_userauth_request: invalid user jarservice [preauth] Jan 8 20:43:48 host sshd[28351]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:43:48 host sshd[28351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.220.82 Jan 8 20:43:49 host sshd[28351]: Failed password for invalid user jarservice from 203.129.220.82 port 37106 ssh2 Jan 8 20:43:49 host sshd[28351]: Received disconnect from 203.129.220.82 port 37106:11: Bye Bye [preauth] Jan 8 20:43:49 host sshd[28351]: Disconnected from 203.129.220.82 port 37106 [preauth] Jan 8 20:43:51 host sshd[28364]: Invalid user andres from 142.93.100.226 port 38918 Jan 8 20:43:51 host sshd[28364]: input_userauth_request: invalid user andres [preauth] Jan 8 20:43:51 host sshd[28364]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:43:51 host sshd[28364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.100.226 Jan 8 20:43:54 host sshd[28364]: Failed password for invalid user andres from 142.93.100.226 port 38918 ssh2 Jan 8 20:43:54 host sshd[28364]: Received disconnect from 142.93.100.226 port 38918:11: Bye Bye [preauth] Jan 8 20:43:54 host sshd[28364]: Disconnected from 142.93.100.226 port 38918 [preauth] Jan 8 20:44:00 host sshd[28377]: Invalid user andy from 46.8.220.111 port 50826 Jan 8 20:44:00 host sshd[28377]: input_userauth_request: invalid user andy [preauth] Jan 8 20:44:00 host sshd[28377]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:44:00 host sshd[28377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.8.220.111 Jan 8 20:44:02 host sshd[28377]: Failed password for invalid user andy from 46.8.220.111 port 50826 ssh2 Jan 8 20:44:02 host sshd[28377]: Received disconnect from 46.8.220.111 port 50826:11: Bye Bye [preauth] Jan 8 20:44:02 host sshd[28377]: Disconnected from 46.8.220.111 port 50826 [preauth] Jan 8 20:44:03 host sshd[28391]: Invalid user tyler from 40.127.173.225 port 58162 Jan 8 20:44:03 host sshd[28391]: input_userauth_request: invalid user tyler [preauth] Jan 8 20:44:03 host sshd[28391]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:44:03 host sshd[28391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.127.173.225 Jan 8 20:44:05 host sshd[28391]: Failed password for invalid user tyler from 40.127.173.225 port 58162 ssh2 Jan 8 20:44:05 host sshd[28391]: Received disconnect from 40.127.173.225 port 58162:11: Bye Bye [preauth] Jan 8 20:44:05 host sshd[28391]: Disconnected from 40.127.173.225 port 58162 [preauth] Jan 8 20:44:20 host sshd[28472]: User mysql from 132.148.75.52 not allowed because not listed in AllowUsers Jan 8 20:44:20 host sshd[28472]: input_userauth_request: invalid user mysql [preauth] Jan 8 20:44:20 host unix_chkpwd[28514]: password check failed for user (mysql) Jan 8 20:44:20 host sshd[28472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.75.52 user=mysql Jan 8 20:44:20 host sshd[28472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 8 20:44:22 host sshd[28472]: Failed password for invalid user mysql from 132.148.75.52 port 44078 ssh2 Jan 8 20:44:39 host sshd[28590]: User mysql from 37.187.112.193 not allowed because not listed in AllowUsers Jan 8 20:44:39 host sshd[28590]: input_userauth_request: invalid user mysql [preauth] Jan 8 20:44:39 host unix_chkpwd[28593]: password check failed for user (mysql) Jan 8 20:44:39 host sshd[28590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.112.193 user=mysql Jan 8 20:44:39 host sshd[28590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 8 20:44:41 host sshd[28590]: Failed password for invalid user mysql from 37.187.112.193 port 55872 ssh2 Jan 8 20:44:54 host sshd[28641]: User mysql from 142.93.100.226 not allowed because not listed in AllowUsers Jan 8 20:44:54 host sshd[28641]: input_userauth_request: invalid user mysql [preauth] Jan 8 20:44:54 host unix_chkpwd[28644]: password check failed for user (mysql) Jan 8 20:44:54 host sshd[28641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.100.226 user=mysql Jan 8 20:44:54 host sshd[28641]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 8 20:44:56 host sshd[28641]: Failed password for invalid user mysql from 142.93.100.226 port 60180 ssh2 Jan 8 20:45:07 host sshd[28712]: Invalid user andres from 46.8.220.111 port 45894 Jan 8 20:45:07 host sshd[28712]: input_userauth_request: invalid user andres [preauth] Jan 8 20:45:07 host sshd[28712]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:45:07 host sshd[28712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.8.220.111 Jan 8 20:45:09 host sshd[28712]: Failed password for invalid user andres from 46.8.220.111 port 45894 ssh2 Jan 8 20:45:09 host sshd[28712]: Received disconnect from 46.8.220.111 port 45894:11: Bye Bye [preauth] Jan 8 20:45:09 host sshd[28712]: Disconnected from 46.8.220.111 port 45894 [preauth] Jan 8 20:45:12 host sshd[28748]: Invalid user mattermost from 40.127.173.225 port 40216 Jan 8 20:45:12 host sshd[28748]: input_userauth_request: invalid user mattermost [preauth] Jan 8 20:45:12 host sshd[28748]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:45:12 host sshd[28748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.127.173.225 Jan 8 20:45:14 host sshd[28748]: Failed password for invalid user mattermost from 40.127.173.225 port 40216 ssh2 Jan 8 20:45:14 host sshd[28748]: Received disconnect from 40.127.173.225 port 40216:11: Bye Bye [preauth] Jan 8 20:45:14 host sshd[28748]: Disconnected from 40.127.173.225 port 40216 [preauth] Jan 8 20:45:14 host sshd[28754]: Invalid user dst from 203.129.220.82 port 38472 Jan 8 20:45:14 host sshd[28754]: input_userauth_request: invalid user dst [preauth] Jan 8 20:45:14 host sshd[28754]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:45:14 host sshd[28754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.220.82 Jan 8 20:45:17 host sshd[28754]: Failed password for invalid user dst from 203.129.220.82 port 38472 ssh2 Jan 8 20:50:06 host sshd[29446]: Invalid user recovery from 43.153.110.124 port 50284 Jan 8 20:50:06 host sshd[29446]: input_userauth_request: invalid user recovery [preauth] Jan 8 20:50:06 host sshd[29446]: pam_unix(sshd:auth): check pass; user unknown Jan 8 20:50:06 host sshd[29446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.110.124 Jan 8 20:50:08 host sshd[29446]: Failed password for invalid user recovery from 43.153.110.124 port 50284 ssh2 Jan 8 20:50:08 host sshd[29446]: Received disconnect from 43.153.110.124 port 50284:11: Bye Bye [preauth] Jan 8 20:50:08 host sshd[29446]: Disconnected from 43.153.110.124 port 50284 [preauth] Jan 8 20:59:38 host sshd[30751]: Did not receive identification string from 185.81.68.174 port 61433 Jan 8 21:04:01 host sshd[31266]: Invalid user radarr from 82.111.224.128 port 43395 Jan 8 21:04:01 host sshd[31266]: input_userauth_request: invalid user radarr [preauth] Jan 8 21:04:01 host sshd[31266]: pam_unix(sshd:auth): check pass; user unknown Jan 8 21:04:01 host sshd[31266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.111.224.128 Jan 8 21:04:02 host sshd[31266]: Failed password for invalid user radarr from 82.111.224.128 port 43395 ssh2 Jan 8 21:04:03 host sshd[31266]: Received disconnect from 82.111.224.128 port 43395:11: Bye Bye [preauth] Jan 8 21:04:03 host sshd[31266]: Disconnected from 82.111.224.128 port 43395 [preauth] Jan 8 21:05:57 host sshd[31647]: Invalid user servidor from 82.111.224.128 port 57739 Jan 8 21:05:57 host sshd[31647]: input_userauth_request: invalid user servidor [preauth] Jan 8 21:05:57 host sshd[31647]: pam_unix(sshd:auth): check pass; user unknown Jan 8 21:05:57 host sshd[31647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.111.224.128 Jan 8 21:05:59 host sshd[31647]: Failed password for invalid user servidor from 82.111.224.128 port 57739 ssh2 Jan 8 21:05:59 host sshd[31647]: Received disconnect from 82.111.224.128 port 57739:11: Bye Bye [preauth] Jan 8 21:05:59 host sshd[31647]: Disconnected from 82.111.224.128 port 57739 [preauth] Jan 8 21:07:03 host sshd[31791]: Invalid user admin from 82.111.224.128 port 41042 Jan 8 21:07:03 host sshd[31791]: input_userauth_request: invalid user admin [preauth] Jan 8 21:07:03 host sshd[31791]: pam_unix(sshd:auth): check pass; user unknown Jan 8 21:07:03 host sshd[31791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.111.224.128 Jan 8 21:07:05 host sshd[31791]: Failed password for invalid user admin from 82.111.224.128 port 41042 ssh2 Jan 8 21:07:05 host sshd[31791]: Received disconnect from 82.111.224.128 port 41042:11: Bye Bye [preauth] Jan 8 21:07:05 host sshd[31791]: Disconnected from 82.111.224.128 port 41042 [preauth] Jan 8 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 21:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=bonifacegroup user-4=wwwevmhonda user-5=mrsclean user-6=wwwnexidigital user-7=palco123 user-8=gifterman user-9=kottayamcalldriv user-10=phmetals user-11=wwwkapin user-12=woodpeck user-13=remysagr user-14=disposeat user-15=wwwkmaorg user-16=pmcresources user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=wwwpmcresource user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 21:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y4EeleQ0qLcWw19E.~ Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y4EeleQ0qLcWw19E.~' Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y4EeleQ0qLcWw19E.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 21:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 21:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 21:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 21:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 21:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 21:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 21:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 21:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 21:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 21:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 21:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 21:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 21:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 21:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 21:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 21:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 21:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 21:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 21:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 21:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 21:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 21:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 21:24:11 host sshd[2431]: Invalid user user1 from 177.93.51.98 port 53920 Jan 8 21:24:11 host sshd[2431]: input_userauth_request: invalid user user1 [preauth] Jan 8 21:24:11 host sshd[2431]: pam_unix(sshd:auth): check pass; user unknown Jan 8 21:24:11 host sshd[2431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.93.51.98 Jan 8 21:24:12 host sshd[2431]: Failed password for invalid user user1 from 177.93.51.98 port 53920 ssh2 Jan 8 21:24:13 host sshd[2431]: Received disconnect from 177.93.51.98 port 53920:11: Bye Bye [preauth] Jan 8 21:24:13 host sshd[2431]: Disconnected from 177.93.51.98 port 53920 [preauth] Jan 8 21:29:53 host sshd[3246]: Invalid user administrator from 159.65.194.58 port 42286 Jan 8 21:29:53 host sshd[3246]: input_userauth_request: invalid user administrator [preauth] Jan 8 21:29:53 host sshd[3246]: pam_unix(sshd:auth): check pass; user unknown Jan 8 21:29:53 host sshd[3246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.194.58 Jan 8 21:29:55 host sshd[3246]: Failed password for invalid user administrator from 159.65.194.58 port 42286 ssh2 Jan 8 21:29:55 host sshd[3246]: Received disconnect from 159.65.194.58 port 42286:11: Bye Bye [preauth] Jan 8 21:29:55 host sshd[3246]: Disconnected from 159.65.194.58 port 42286 [preauth] Jan 8 21:31:47 host sshd[3511]: Invalid user teamspeak from 159.65.194.58 port 40818 Jan 8 21:31:47 host sshd[3511]: input_userauth_request: invalid user teamspeak [preauth] Jan 8 21:31:47 host sshd[3511]: pam_unix(sshd:auth): check pass; user unknown Jan 8 21:31:47 host sshd[3511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.194.58 Jan 8 21:31:49 host sshd[3511]: Failed password for invalid user teamspeak from 159.65.194.58 port 40818 ssh2 Jan 8 21:31:49 host sshd[3511]: Received disconnect from 159.65.194.58 port 40818:11: Bye Bye [preauth] Jan 8 21:31:49 host sshd[3511]: Disconnected from 159.65.194.58 port 40818 [preauth] Jan 8 21:32:54 host sshd[3719]: Invalid user installer from 159.65.194.58 port 35688 Jan 8 21:32:54 host sshd[3719]: input_userauth_request: invalid user installer [preauth] Jan 8 21:32:54 host sshd[3719]: pam_unix(sshd:auth): check pass; user unknown Jan 8 21:32:54 host sshd[3719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.194.58 Jan 8 21:32:56 host sshd[3719]: Failed password for invalid user installer from 159.65.194.58 port 35688 ssh2 Jan 8 21:32:56 host sshd[3719]: Received disconnect from 159.65.194.58 port 35688:11: Bye Bye [preauth] Jan 8 21:32:56 host sshd[3719]: Disconnected from 159.65.194.58 port 35688 [preauth] Jan 8 21:43:34 host sshd[5081]: Invalid user bi from 194.110.203.109 port 47516 Jan 8 21:43:34 host sshd[5081]: input_userauth_request: invalid user bi [preauth] Jan 8 21:43:34 host sshd[5081]: pam_unix(sshd:auth): check pass; user unknown Jan 8 21:43:34 host sshd[5081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 21:43:36 host sshd[5081]: Failed password for invalid user bi from 194.110.203.109 port 47516 ssh2 Jan 8 21:43:39 host sshd[5081]: pam_unix(sshd:auth): check pass; user unknown Jan 8 21:43:41 host sshd[5081]: Failed password for invalid user bi from 194.110.203.109 port 47516 ssh2 Jan 8 21:43:44 host sshd[5081]: pam_unix(sshd:auth): check pass; user unknown Jan 8 21:43:46 host sshd[5081]: Failed password for invalid user bi from 194.110.203.109 port 47516 ssh2 Jan 8 21:43:49 host sshd[5081]: Connection closed by 194.110.203.109 port 47516 [preauth] Jan 8 21:43:49 host sshd[5081]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 21:47:40 host sshd[5632]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 8 21:47:40 host sshd[5632]: input_userauth_request: invalid user root [preauth] Jan 8 21:47:40 host unix_chkpwd[5640]: password check failed for user (root) Jan 8 21:47:40 host sshd[5632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 8 21:47:40 host sshd[5632]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 21:47:43 host sshd[5632]: Failed password for invalid user root from 209.141.55.27 port 34282 ssh2 Jan 8 21:47:43 host sshd[5632]: Received disconnect from 209.141.55.27 port 34282:11: Normal Shutdown, Thank you for playing [preauth] Jan 8 21:47:43 host sshd[5632]: Disconnected from 209.141.55.27 port 34282 [preauth] Jan 8 22:06:35 host sshd[8066]: Did not receive identification string from 159.89.87.244 port 43664 Jan 8 22:16:47 host sshd[9458]: Invalid user ubnt from 46.3.223.178 port 15811 Jan 8 22:16:47 host sshd[9458]: input_userauth_request: invalid user ubnt [preauth] Jan 8 22:16:47 host sshd[9458]: pam_unix(sshd:auth): check pass; user unknown Jan 8 22:16:47 host sshd[9458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.3.223.178 Jan 8 22:16:49 host sshd[9458]: Failed password for invalid user ubnt from 46.3.223.178 port 15811 ssh2 Jan 8 22:16:49 host sshd[9458]: Received disconnect from 46.3.223.178 port 15811:11: Client disconnecting normally [preauth] Jan 8 22:16:49 host sshd[9458]: Disconnected from 46.3.223.178 port 15811 [preauth] Jan 8 22:16:51 host sshd[9463]: Invalid user admin from 46.3.223.178 port 16464 Jan 8 22:16:51 host sshd[9463]: input_userauth_request: invalid user admin [preauth] Jan 8 22:16:51 host sshd[9463]: pam_unix(sshd:auth): check pass; user unknown Jan 8 22:16:51 host sshd[9463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.3.223.178 Jan 8 22:16:53 host sshd[9463]: Failed password for invalid user admin from 46.3.223.178 port 16464 ssh2 Jan 8 22:16:53 host sshd[9463]: Received disconnect from 46.3.223.178 port 16464:11: Client disconnecting normally [preauth] Jan 8 22:16:53 host sshd[9463]: Disconnected from 46.3.223.178 port 16464 [preauth] Jan 8 22:16:55 host sshd[9476]: User root from 46.3.223.178 not allowed because not listed in AllowUsers Jan 8 22:16:55 host sshd[9476]: input_userauth_request: invalid user root [preauth] Jan 8 22:16:55 host unix_chkpwd[9479]: password check failed for user (root) Jan 8 22:16:55 host sshd[9476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.3.223.178 user=root Jan 8 22:16:55 host sshd[9476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 8 22:16:57 host sshd[9476]: Failed password for invalid user root from 46.3.223.178 port 17168 ssh2 Jan 8 22:16:57 host sshd[9476]: Received disconnect from 46.3.223.178 port 17168:11: Client disconnecting normally [preauth] Jan 8 22:16:57 host sshd[9476]: Disconnected from 46.3.223.178 port 17168 [preauth] Jan 8 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 22:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=bonifacegroup user-4=wwwevmhonda user-5=wwwnexidigital user-6=mrsclean user-7=gifterman user-8=palco123 user-9=phmetals user-10=kottayamcalldriv user-11=woodpeck user-12=wwwkapin user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=wwwpmcresource user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 22:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-A4PXUosEP8B4iZnB.~ Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-A4PXUosEP8B4iZnB.~' Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-A4PXUosEP8B4iZnB.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 22:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 22:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 22:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 22:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 22:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 22:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 22:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 22:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 22:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 22:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 22:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 22:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 22:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 22:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 22:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 22:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 22:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 22:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 22:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 22:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 22:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 22:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 22:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 22:22:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 22:32:48 host sshd[11668]: Did not receive identification string from 167.71.166.243 port 41698 Jan 8 22:42:36 host sshd[12965]: Connection closed by 167.71.166.243 port 56904 [preauth] Jan 8 22:51:21 host sshd[14061]: Invalid user .syslog from 143.244.158.100 port 35174 Jan 8 22:51:21 host sshd[14061]: input_userauth_request: invalid user .syslog [preauth] Jan 8 22:51:22 host sshd[14061]: pam_unix(sshd:auth): check pass; user unknown Jan 8 22:51:22 host sshd[14061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.158.100 Jan 8 22:51:23 host sshd[14061]: Failed password for invalid user .syslog from 143.244.158.100 port 35174 ssh2 Jan 8 22:51:23 host sshd[14061]: Received disconnect from 143.244.158.100 port 35174:11: Bye Bye [preauth] Jan 8 22:51:23 host sshd[14061]: Disconnected from 143.244.158.100 port 35174 [preauth] Jan 8 23:18:43 host sshd[17691]: Did not receive identification string from 107.170.226.20 port 32770 Jan 8 23:18:44 host sshd[17702]: Invalid user robin from 106.251.237.178 port 47886 Jan 8 23:18:44 host sshd[17702]: input_userauth_request: invalid user robin [preauth] Jan 8 23:18:44 host sshd[17702]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:18:44 host sshd[17702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.251.237.178 Jan 8 23:18:46 host sshd[17702]: Failed password for invalid user robin from 106.251.237.178 port 47886 ssh2 Jan 8 23:18:46 host sshd[17702]: Received disconnect from 106.251.237.178 port 47886:11: Bye Bye [preauth] Jan 8 23:18:46 host sshd[17702]: Disconnected from 106.251.237.178 port 47886 [preauth] Jan 8 23:20:04 host sshd[17856]: Invalid user space from 185.74.4.189 port 33718 Jan 8 23:20:04 host sshd[17856]: input_userauth_request: invalid user space [preauth] Jan 8 23:20:04 host sshd[17856]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:20:04 host sshd[17856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.189 Jan 8 23:20:06 host sshd[17856]: Failed password for invalid user space from 185.74.4.189 port 33718 ssh2 Jan 8 23:20:06 host sshd[17856]: Received disconnect from 185.74.4.189 port 33718:11: Bye Bye [preauth] Jan 8 23:20:06 host sshd[17856]: Disconnected from 185.74.4.189 port 33718 [preauth] Jan 8 23:21:35 host sshd[18135]: Invalid user abdul from 159.203.85.196 port 33463 Jan 8 23:21:35 host sshd[18135]: input_userauth_request: invalid user abdul [preauth] Jan 8 23:21:35 host sshd[18135]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:21:35 host sshd[18135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.85.196 Jan 8 23:21:38 host sshd[18135]: Failed password for invalid user abdul from 159.203.85.196 port 33463 ssh2 Jan 8 23:21:38 host sshd[18135]: Received disconnect from 159.203.85.196 port 33463:11: Bye Bye [preauth] Jan 8 23:21:38 host sshd[18135]: Disconnected from 159.203.85.196 port 33463 [preauth] Jan 8 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 23:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwrmswll user-5=wwwresourcehunte user-6=keralaholi user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=gifterman user-19=palco123 user-20=wwwnexidigital user-21=mrsclean user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=wwwtestugo user-28=shalinijames user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 8 23:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4VM2h9aBGigzcjsP.~ Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4VM2h9aBGigzcjsP.~' Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4VM2h9aBGigzcjsP.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 23:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 8 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 8 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 8 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 8 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 8 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 8 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 8 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 8 23:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 8 23:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 8 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 8 23:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 8 23:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 8 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 8 23:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 8 23:22:10 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 8 23:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 8 23:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 23:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 23:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 8 23:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 23:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 23:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 8 23:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 8 23:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 8 23:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 8 23:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 23:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 23:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 8 23:22:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 8 23:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 8 23:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 8 23:22:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 8 23:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 8 23:23:49 host sshd[18641]: Invalid user ldap from 164.90.224.134 port 55230 Jan 8 23:23:49 host sshd[18641]: input_userauth_request: invalid user ldap [preauth] Jan 8 23:23:49 host sshd[18641]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:23:49 host sshd[18641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.224.134 Jan 8 23:23:51 host sshd[18641]: Failed password for invalid user ldap from 164.90.224.134 port 55230 ssh2 Jan 8 23:23:52 host sshd[18641]: Received disconnect from 164.90.224.134 port 55230:11: Bye Bye [preauth] Jan 8 23:23:52 host sshd[18641]: Disconnected from 164.90.224.134 port 55230 [preauth] Jan 8 23:25:00 host sshd[18774]: Invalid user devopsuser from 159.203.85.196 port 55019 Jan 8 23:25:00 host sshd[18774]: input_userauth_request: invalid user devopsuser [preauth] Jan 8 23:25:00 host sshd[18774]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:25:00 host sshd[18774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.85.196 Jan 8 23:25:02 host sshd[18774]: Failed password for invalid user devopsuser from 159.203.85.196 port 55019 ssh2 Jan 8 23:25:02 host sshd[18774]: Received disconnect from 159.203.85.196 port 55019:11: Bye Bye [preauth] Jan 8 23:25:02 host sshd[18774]: Disconnected from 159.203.85.196 port 55019 [preauth] Jan 8 23:25:13 host sshd[18808]: Invalid user william from 164.90.224.134 port 55784 Jan 8 23:25:13 host sshd[18808]: input_userauth_request: invalid user william [preauth] Jan 8 23:25:13 host sshd[18808]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:25:13 host sshd[18808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.224.134 Jan 8 23:25:14 host sshd[18808]: Failed password for invalid user william from 164.90.224.134 port 55784 ssh2 Jan 8 23:25:14 host sshd[18808]: Received disconnect from 164.90.224.134 port 55784:11: Bye Bye [preauth] Jan 8 23:25:14 host sshd[18808]: Disconnected from 164.90.224.134 port 55784 [preauth] Jan 8 23:25:29 host sshd[18847]: Invalid user user04 from 167.99.67.143 port 49140 Jan 8 23:25:29 host sshd[18847]: input_userauth_request: invalid user user04 [preauth] Jan 8 23:25:29 host sshd[18847]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:25:29 host sshd[18847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.67.143 Jan 8 23:25:32 host sshd[18847]: Failed password for invalid user user04 from 167.99.67.143 port 49140 ssh2 Jan 8 23:25:32 host sshd[18847]: Received disconnect from 167.99.67.143 port 49140:11: Bye Bye [preauth] Jan 8 23:25:32 host sshd[18847]: Disconnected from 167.99.67.143 port 49140 [preauth] Jan 8 23:26:10 host sshd[18911]: Invalid user git from 159.203.85.196 port 40498 Jan 8 23:26:10 host sshd[18911]: input_userauth_request: invalid user git [preauth] Jan 8 23:26:10 host sshd[18911]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:26:10 host sshd[18911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.85.196 Jan 8 23:26:12 host sshd[18911]: Failed password for invalid user git from 159.203.85.196 port 40498 ssh2 Jan 8 23:26:19 host sshd[19061]: Invalid user devuser from 164.90.224.134 port 55060 Jan 8 23:26:19 host sshd[19061]: input_userauth_request: invalid user devuser [preauth] Jan 8 23:26:19 host sshd[19061]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:26:19 host sshd[19061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.224.134 Jan 8 23:26:21 host sshd[19061]: Failed password for invalid user devuser from 164.90.224.134 port 55060 ssh2 Jan 8 23:26:49 host sshd[19179]: Invalid user test from 167.99.67.143 port 44148 Jan 8 23:26:49 host sshd[19179]: input_userauth_request: invalid user test [preauth] Jan 8 23:26:49 host sshd[19179]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:26:49 host sshd[19179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.67.143 Jan 8 23:26:51 host sshd[19179]: Failed password for invalid user test from 167.99.67.143 port 44148 ssh2 Jan 8 23:26:51 host sshd[19179]: Received disconnect from 167.99.67.143 port 44148:11: Bye Bye [preauth] Jan 8 23:26:51 host sshd[19179]: Disconnected from 167.99.67.143 port 44148 [preauth] Jan 8 23:27:59 host sshd[19302]: Invalid user abdul from 185.74.4.189 port 58662 Jan 8 23:27:59 host sshd[19302]: input_userauth_request: invalid user abdul [preauth] Jan 8 23:27:59 host sshd[19302]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:27:59 host sshd[19302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.189 Jan 8 23:28:02 host sshd[19302]: Failed password for invalid user abdul from 185.74.4.189 port 58662 ssh2 Jan 8 23:28:02 host sshd[19302]: Received disconnect from 185.74.4.189 port 58662:11: Bye Bye [preauth] Jan 8 23:28:02 host sshd[19302]: Disconnected from 185.74.4.189 port 58662 [preauth] Jan 8 23:28:03 host sshd[19326]: Invalid user student from 167.99.67.143 port 38964 Jan 8 23:28:03 host sshd[19326]: input_userauth_request: invalid user student [preauth] Jan 8 23:28:03 host sshd[19326]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:28:03 host sshd[19326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.67.143 Jan 8 23:28:05 host sshd[19326]: Failed password for invalid user student from 167.99.67.143 port 38964 ssh2 Jan 8 23:28:05 host sshd[19326]: Received disconnect from 167.99.67.143 port 38964:11: Bye Bye [preauth] Jan 8 23:28:05 host sshd[19326]: Disconnected from 167.99.67.143 port 38964 [preauth] Jan 8 23:29:48 host sshd[19532]: Invalid user wow from 185.74.4.189 port 48408 Jan 8 23:29:48 host sshd[19532]: input_userauth_request: invalid user wow [preauth] Jan 8 23:29:48 host sshd[19532]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:29:48 host sshd[19532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.189 Jan 8 23:29:50 host sshd[19532]: Failed password for invalid user wow from 185.74.4.189 port 48408 ssh2 Jan 8 23:29:51 host sshd[19532]: Received disconnect from 185.74.4.189 port 48408:11: Bye Bye [preauth] Jan 8 23:29:51 host sshd[19532]: Disconnected from 185.74.4.189 port 48408 [preauth] Jan 8 23:41:52 host sshd[21347]: Invalid user bj from 194.110.203.109 port 46458 Jan 8 23:41:52 host sshd[21347]: input_userauth_request: invalid user bj [preauth] Jan 8 23:41:52 host sshd[21347]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:41:52 host sshd[21347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 23:41:53 host sshd[21347]: Failed password for invalid user bj from 194.110.203.109 port 46458 ssh2 Jan 8 23:41:56 host sshd[21347]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:41:58 host sshd[21347]: Failed password for invalid user bj from 194.110.203.109 port 46458 ssh2 Jan 8 23:42:02 host sshd[21347]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:42:03 host sshd[21347]: Failed password for invalid user bj from 194.110.203.109 port 46458 ssh2 Jan 8 23:42:07 host sshd[21347]: Connection closed by 194.110.203.109 port 46458 [preauth] Jan 8 23:42:07 host sshd[21347]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 8 23:53:22 host sshd[22910]: Invalid user robin from 185.133.225.62 port 46202 Jan 8 23:53:22 host sshd[22910]: input_userauth_request: invalid user robin [preauth] Jan 8 23:53:22 host sshd[22910]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:53:22 host sshd[22910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.133.225.62 Jan 8 23:53:24 host sshd[22918]: Invalid user usuario from 200.53.21.177 port 33432 Jan 8 23:53:24 host sshd[22918]: input_userauth_request: invalid user usuario [preauth] Jan 8 23:53:24 host sshd[22918]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:53:24 host sshd[22918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.53.21.177 Jan 8 23:53:24 host sshd[22910]: Failed password for invalid user robin from 185.133.225.62 port 46202 ssh2 Jan 8 23:53:24 host sshd[22910]: Received disconnect from 185.133.225.62 port 46202:11: Bye Bye [preauth] Jan 8 23:53:24 host sshd[22910]: Disconnected from 185.133.225.62 port 46202 [preauth] Jan 8 23:53:25 host sshd[22918]: Failed password for invalid user usuario from 200.53.21.177 port 33432 ssh2 Jan 8 23:53:25 host sshd[22918]: Received disconnect from 200.53.21.177 port 33432:11: Bye Bye [preauth] Jan 8 23:53:25 host sshd[22918]: Disconnected from 200.53.21.177 port 33432 [preauth] Jan 8 23:54:17 host sshd[23064]: Did not receive identification string from 8.219.76.192 port 61000 Jan 8 23:54:26 host sshd[23080]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 192.241.232.26 port 45220 Jan 8 23:56:06 host sshd[23438]: Invalid user jimmy from 206.189.87.77 port 52392 Jan 8 23:56:06 host sshd[23438]: input_userauth_request: invalid user jimmy [preauth] Jan 8 23:56:06 host sshd[23438]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:56:06 host sshd[23438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.77 Jan 8 23:56:08 host sshd[23438]: Failed password for invalid user jimmy from 206.189.87.77 port 52392 ssh2 Jan 8 23:56:08 host sshd[23438]: Received disconnect from 206.189.87.77 port 52392:11: Bye Bye [preauth] Jan 8 23:56:08 host sshd[23438]: Disconnected from 206.189.87.77 port 52392 [preauth] Jan 8 23:56:56 host sshd[23530]: Invalid user linaro from 43.153.51.28 port 54810 Jan 8 23:56:56 host sshd[23530]: input_userauth_request: invalid user linaro [preauth] Jan 8 23:56:56 host sshd[23530]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:56:56 host sshd[23530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.51.28 Jan 8 23:56:58 host sshd[23530]: Failed password for invalid user linaro from 43.153.51.28 port 54810 ssh2 Jan 8 23:56:58 host sshd[23530]: Received disconnect from 43.153.51.28 port 54810:11: Bye Bye [preauth] Jan 8 23:56:58 host sshd[23530]: Disconnected from 43.153.51.28 port 54810 [preauth] Jan 8 23:57:38 host sshd[23619]: Invalid user tiptop from 200.53.21.177 port 34102 Jan 8 23:57:38 host sshd[23619]: input_userauth_request: invalid user tiptop [preauth] Jan 8 23:57:38 host sshd[23619]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:57:38 host sshd[23619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.53.21.177 Jan 8 23:57:41 host sshd[23619]: Failed password for invalid user tiptop from 200.53.21.177 port 34102 ssh2 Jan 8 23:57:41 host sshd[23619]: Received disconnect from 200.53.21.177 port 34102:11: Bye Bye [preauth] Jan 8 23:57:41 host sshd[23619]: Disconnected from 200.53.21.177 port 34102 [preauth] Jan 8 23:57:58 host sshd[23637]: Invalid user postgres from 185.133.225.62 port 39174 Jan 8 23:57:58 host sshd[23637]: input_userauth_request: invalid user postgres [preauth] Jan 8 23:57:58 host sshd[23637]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:57:58 host sshd[23637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.133.225.62 Jan 8 23:58:00 host sshd[23637]: Failed password for invalid user postgres from 185.133.225.62 port 39174 ssh2 Jan 8 23:58:00 host sshd[23637]: Received disconnect from 185.133.225.62 port 39174:11: Bye Bye [preauth] Jan 8 23:58:00 host sshd[23637]: Disconnected from 185.133.225.62 port 39174 [preauth] Jan 8 23:59:03 host sshd[23797]: Invalid user test from 206.189.87.77 port 58354 Jan 8 23:59:03 host sshd[23797]: input_userauth_request: invalid user test [preauth] Jan 8 23:59:03 host sshd[23797]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:59:03 host sshd[23797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.77 Jan 8 23:59:06 host sshd[23797]: Failed password for invalid user test from 206.189.87.77 port 58354 ssh2 Jan 8 23:59:06 host sshd[23797]: Received disconnect from 206.189.87.77 port 58354:11: Bye Bye [preauth] Jan 8 23:59:06 host sshd[23797]: Disconnected from 206.189.87.77 port 58354 [preauth] Jan 8 23:59:09 host sshd[23810]: Invalid user ruben from 200.53.21.177 port 48378 Jan 8 23:59:09 host sshd[23810]: input_userauth_request: invalid user ruben [preauth] Jan 8 23:59:09 host sshd[23810]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:59:09 host sshd[23810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.53.21.177 Jan 8 23:59:11 host sshd[23810]: Failed password for invalid user ruben from 200.53.21.177 port 48378 ssh2 Jan 8 23:59:11 host sshd[23810]: Received disconnect from 200.53.21.177 port 48378:11: Bye Bye [preauth] Jan 8 23:59:11 host sshd[23810]: Disconnected from 200.53.21.177 port 48378 [preauth] Jan 8 23:59:17 host sshd[23859]: Invalid user giovanni from 185.133.225.62 port 38030 Jan 8 23:59:17 host sshd[23859]: input_userauth_request: invalid user giovanni [preauth] Jan 8 23:59:17 host sshd[23859]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:59:17 host sshd[23859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.133.225.62 Jan 8 23:59:19 host sshd[23859]: Failed password for invalid user giovanni from 185.133.225.62 port 38030 ssh2 Jan 8 23:59:20 host sshd[23859]: Received disconnect from 185.133.225.62 port 38030:11: Bye Bye [preauth] Jan 8 23:59:20 host sshd[23859]: Disconnected from 185.133.225.62 port 38030 [preauth] Jan 8 23:59:54 host sshd[23960]: Invalid user teamspeak from 43.153.51.28 port 53580 Jan 8 23:59:54 host sshd[23960]: input_userauth_request: invalid user teamspeak [preauth] Jan 8 23:59:54 host sshd[23960]: pam_unix(sshd:auth): check pass; user unknown Jan 8 23:59:54 host sshd[23960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.51.28 Jan 8 23:59:56 host sshd[23960]: Failed password for invalid user teamspeak from 43.153.51.28 port 53580 ssh2 Jan 8 23:59:56 host sshd[23960]: Received disconnect from 43.153.51.28 port 53580:11: Bye Bye [preauth] Jan 8 23:59:56 host sshd[23960]: Disconnected from 43.153.51.28 port 53580 [preauth] Jan 9 00:00:23 host sshd[24080]: Invalid user linda from 206.189.87.77 port 53498 Jan 9 00:00:23 host sshd[24080]: input_userauth_request: invalid user linda [preauth] Jan 9 00:00:23 host sshd[24080]: pam_unix(sshd:auth): check pass; user unknown Jan 9 00:00:23 host sshd[24080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.77 Jan 9 00:00:25 host sshd[24080]: Failed password for invalid user linda from 206.189.87.77 port 53498 ssh2 Jan 9 00:00:25 host sshd[24080]: Received disconnect from 206.189.87.77 port 53498:11: Bye Bye [preauth] Jan 9 00:00:25 host sshd[24080]: Disconnected from 206.189.87.77 port 53498 [preauth] Jan 9 00:00:59 host sshd[24148]: Invalid user zs from 43.153.51.28 port 40274 Jan 9 00:00:59 host sshd[24148]: input_userauth_request: invalid user zs [preauth] Jan 9 00:00:59 host sshd[24148]: pam_unix(sshd:auth): check pass; user unknown Jan 9 00:00:59 host sshd[24148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.51.28 Jan 9 00:01:01 host sshd[24148]: Failed password for invalid user zs from 43.153.51.28 port 40274 ssh2 Jan 9 00:01:01 host sshd[24148]: Received disconnect from 43.153.51.28 port 40274:11: Bye Bye [preauth] Jan 9 00:01:01 host sshd[24148]: Disconnected from 43.153.51.28 port 40274 [preauth] Jan 9 00:01:48 host sshd[24260]: Invalid user bruno from 206.189.87.77 port 48638 Jan 9 00:01:48 host sshd[24260]: input_userauth_request: invalid user bruno [preauth] Jan 9 00:01:48 host sshd[24260]: pam_unix(sshd:auth): check pass; user unknown Jan 9 00:01:48 host sshd[24260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.77 Jan 9 00:01:50 host sshd[24260]: Failed password for invalid user bruno from 206.189.87.77 port 48638 ssh2 Jan 9 00:01:50 host sshd[24260]: Received disconnect from 206.189.87.77 port 48638:11: Bye Bye [preauth] Jan 9 00:01:50 host sshd[24260]: Disconnected from 206.189.87.77 port 48638 [preauth] Jan 9 00:02:02 host sshd[24281]: Invalid user usuario from 43.153.51.28 port 54772 Jan 9 00:02:02 host sshd[24281]: input_userauth_request: invalid user usuario [preauth] Jan 9 00:02:02 host sshd[24281]: pam_unix(sshd:auth): check pass; user unknown Jan 9 00:02:02 host sshd[24281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.51.28 Jan 9 00:02:04 host sshd[24281]: Failed password for invalid user usuario from 43.153.51.28 port 54772 ssh2 Jan 9 00:02:05 host sshd[24281]: Received disconnect from 43.153.51.28 port 54772:11: Bye Bye [preauth] Jan 9 00:02:05 host sshd[24281]: Disconnected from 43.153.51.28 port 54772 [preauth] Jan 9 00:02:12 host sshd[24387]: Invalid user fake from 195.24.67.214 port 35022 Jan 9 00:02:12 host sshd[24387]: input_userauth_request: invalid user fake [preauth] Jan 9 00:02:12 host sshd[24387]: pam_unix(sshd:auth): check pass; user unknown Jan 9 00:02:12 host sshd[24387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.67.214 Jan 9 00:02:15 host sshd[24387]: Failed password for invalid user fake from 195.24.67.214 port 35022 ssh2 Jan 9 00:02:15 host sshd[24387]: Received disconnect from 195.24.67.214 port 35022:11: Bye Bye [preauth] Jan 9 00:02:15 host sshd[24387]: Disconnected from 195.24.67.214 port 35022 [preauth] Jan 9 00:02:16 host sshd[24416]: Invalid user ubnt from 195.24.67.214 port 48542 Jan 9 00:02:16 host sshd[24416]: input_userauth_request: invalid user ubnt [preauth] Jan 9 00:02:16 host sshd[24416]: pam_unix(sshd:auth): check pass; user unknown Jan 9 00:02:16 host sshd[24416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.67.214 Jan 9 00:02:18 host sshd[24416]: Failed password for invalid user ubnt from 195.24.67.214 port 48542 ssh2 Jan 9 00:02:18 host sshd[24416]: Received disconnect from 195.24.67.214 port 48542:11: Bye Bye [preauth] Jan 9 00:02:18 host sshd[24416]: Disconnected from 195.24.67.214 port 48542 [preauth] Jan 9 00:02:20 host sshd[24423]: User root from 195.24.67.214 not allowed because not listed in AllowUsers Jan 9 00:02:20 host sshd[24423]: input_userauth_request: invalid user root [preauth] Jan 9 00:02:20 host unix_chkpwd[24428]: password check failed for user (root) Jan 9 00:02:20 host sshd[24423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.67.214 user=root Jan 9 00:02:20 host sshd[24423]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 00:02:22 host sshd[24423]: Failed password for invalid user root from 195.24.67.214 port 34586 ssh2 Jan 9 00:02:22 host sshd[24423]: Received disconnect from 195.24.67.214 port 34586:11: Bye Bye [preauth] Jan 9 00:02:22 host sshd[24423]: Disconnected from 195.24.67.214 port 34586 [preauth] Jan 9 00:02:23 host sshd[24433]: Invalid user admin from 195.24.67.214 port 47982 Jan 9 00:02:23 host sshd[24433]: input_userauth_request: invalid user admin [preauth] Jan 9 00:02:23 host sshd[24433]: pam_unix(sshd:auth): check pass; user unknown Jan 9 00:02:23 host sshd[24433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.67.214 Jan 9 00:02:26 host sshd[24433]: Failed password for invalid user admin from 195.24.67.214 port 47982 ssh2 Jan 9 00:03:04 host sshd[24557]: Invalid user robin from 206.189.87.77 port 43782 Jan 9 00:03:04 host sshd[24557]: input_userauth_request: invalid user robin [preauth] Jan 9 00:03:04 host sshd[24557]: pam_unix(sshd:auth): check pass; user unknown Jan 9 00:03:04 host sshd[24557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.77 Jan 9 00:03:05 host sshd[24560]: Invalid user ray from 43.153.51.28 port 38506 Jan 9 00:03:05 host sshd[24560]: input_userauth_request: invalid user ray [preauth] Jan 9 00:03:05 host sshd[24560]: pam_unix(sshd:auth): check pass; user unknown Jan 9 00:03:05 host sshd[24560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.51.28 Jan 9 00:03:06 host sshd[24557]: Failed password for invalid user robin from 206.189.87.77 port 43782 ssh2 Jan 9 00:03:06 host sshd[24557]: Received disconnect from 206.189.87.77 port 43782:11: Bye Bye [preauth] Jan 9 00:03:06 host sshd[24557]: Disconnected from 206.189.87.77 port 43782 [preauth] Jan 9 00:03:08 host sshd[24560]: Failed password for invalid user ray from 43.153.51.28 port 38506 ssh2 Jan 9 00:03:08 host sshd[24560]: Received disconnect from 43.153.51.28 port 38506:11: Bye Bye [preauth] Jan 9 00:03:08 host sshd[24560]: Disconnected from 43.153.51.28 port 38506 [preauth] Jan 9 00:13:08 host sshd[26077]: Connection closed by 45.79.128.205 port 46670 [preauth] Jan 9 00:13:10 host sshd[26081]: Connection closed by 45.79.128.205 port 46672 [preauth] Jan 9 00:13:12 host sshd[26085]: Connection closed by 45.79.128.205 port 46676 [preauth] Jan 9 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 00:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=phmetals user-2=kottayamcalldriv user-3=gifterman user-4=palco123 user-5=wwwnexidigital user-6=mrsclean user-7=wwwevmhonda user-8=bonifacegroup user-9=straightcurve user-10=wwwletsstalkfood user-11=wwwtestugo user-12=shalinijames user-13=vfmassets user-14=pmcresources user-15=disposeat user-16=remysagr user-17=wwwkmaorg user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 00:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Ga7YlDRn7tCkV6rS.~ Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Ga7YlDRn7tCkV6rS.~' Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Ga7YlDRn7tCkV6rS.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 00:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 00:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 00:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 00:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 00:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 00:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 00:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 00:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 00:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 00:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 00:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 00:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 00:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 00:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 00:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 00:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 00:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 00:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 00:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 00:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 00:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 00:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 00:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 00:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 00:34:12 host sshd[30046]: Invalid user .log from 143.244.158.100 port 47052 Jan 9 00:34:12 host sshd[30046]: input_userauth_request: invalid user .log [preauth] Jan 9 00:34:12 host sshd[30046]: pam_unix(sshd:auth): check pass; user unknown Jan 9 00:34:12 host sshd[30046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.158.100 Jan 9 00:34:14 host sshd[30046]: Failed password for invalid user .log from 143.244.158.100 port 47052 ssh2 Jan 9 00:34:14 host sshd[30046]: Received disconnect from 143.244.158.100 port 47052:11: Bye Bye [preauth] Jan 9 00:34:14 host sshd[30046]: Disconnected from 143.244.158.100 port 47052 [preauth] Jan 9 00:58:42 host sshd[842]: Invalid user alejandro from 157.230.2.208 port 53992 Jan 9 00:58:42 host sshd[842]: input_userauth_request: invalid user alejandro [preauth] Jan 9 00:58:42 host sshd[842]: pam_unix(sshd:auth): check pass; user unknown Jan 9 00:58:42 host sshd[842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.2.208 Jan 9 00:58:44 host sshd[842]: Failed password for invalid user alejandro from 157.230.2.208 port 53992 ssh2 Jan 9 00:58:44 host sshd[842]: Received disconnect from 157.230.2.208 port 53992:11: Bye Bye [preauth] Jan 9 00:58:44 host sshd[842]: Disconnected from 157.230.2.208 port 53992 [preauth] Jan 9 01:04:00 host sshd[1530]: Invalid user kara from 157.230.2.208 port 35548 Jan 9 01:04:00 host sshd[1530]: input_userauth_request: invalid user kara [preauth] Jan 9 01:04:00 host sshd[1530]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:04:00 host sshd[1530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.2.208 Jan 9 01:04:02 host sshd[1530]: Failed password for invalid user kara from 157.230.2.208 port 35548 ssh2 Jan 9 01:04:02 host sshd[1530]: Received disconnect from 157.230.2.208 port 35548:11: Bye Bye [preauth] Jan 9 01:04:02 host sshd[1530]: Disconnected from 157.230.2.208 port 35548 [preauth] Jan 9 01:04:37 host sshd[1624]: Invalid user werkstatt from 51.15.171.97 port 34190 Jan 9 01:04:37 host sshd[1624]: input_userauth_request: invalid user werkstatt [preauth] Jan 9 01:04:37 host sshd[1624]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:04:37 host sshd[1624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.171.97 Jan 9 01:04:39 host sshd[1624]: Failed password for invalid user werkstatt from 51.15.171.97 port 34190 ssh2 Jan 9 01:04:39 host sshd[1624]: Received disconnect from 51.15.171.97 port 34190:11: Bye Bye [preauth] Jan 9 01:04:39 host sshd[1624]: Disconnected from 51.15.171.97 port 34190 [preauth] Jan 9 01:05:02 host sshd[1663]: Invalid user ftptest from 157.230.2.208 port 33254 Jan 9 01:05:02 host sshd[1663]: input_userauth_request: invalid user ftptest [preauth] Jan 9 01:05:02 host sshd[1663]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:05:02 host sshd[1663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.2.208 Jan 9 01:05:05 host sshd[1663]: Failed password for invalid user ftptest from 157.230.2.208 port 33254 ssh2 Jan 9 01:05:05 host sshd[1663]: Received disconnect from 157.230.2.208 port 33254:11: Bye Bye [preauth] Jan 9 01:05:05 host sshd[1663]: Disconnected from 157.230.2.208 port 33254 [preauth] Jan 9 01:05:52 host sshd[1951]: Invalid user traffic from 51.15.171.97 port 34326 Jan 9 01:05:52 host sshd[1951]: input_userauth_request: invalid user traffic [preauth] Jan 9 01:05:52 host sshd[1951]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:05:52 host sshd[1951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.171.97 Jan 9 01:05:55 host sshd[1951]: Failed password for invalid user traffic from 51.15.171.97 port 34326 ssh2 Jan 9 01:05:55 host sshd[1951]: Received disconnect from 51.15.171.97 port 34326:11: Bye Bye [preauth] Jan 9 01:05:55 host sshd[1951]: Disconnected from 51.15.171.97 port 34326 [preauth] Jan 9 01:07:05 host sshd[2092]: Invalid user postgres from 51.15.171.97 port 34460 Jan 9 01:07:05 host sshd[2092]: input_userauth_request: invalid user postgres [preauth] Jan 9 01:07:05 host sshd[2092]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:07:05 host sshd[2092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.171.97 Jan 9 01:07:07 host sshd[2092]: Failed password for invalid user postgres from 51.15.171.97 port 34460 ssh2 Jan 9 01:09:02 host sshd[2359]: Invalid user user15 from 178.128.102.42 port 60308 Jan 9 01:09:02 host sshd[2359]: input_userauth_request: invalid user user15 [preauth] Jan 9 01:09:02 host sshd[2359]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:09:02 host sshd[2359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.102.42 Jan 9 01:09:04 host sshd[2359]: Failed password for invalid user user15 from 178.128.102.42 port 60308 ssh2 Jan 9 01:09:04 host sshd[2359]: Received disconnect from 178.128.102.42 port 60308:11: Bye Bye [preauth] Jan 9 01:09:04 host sshd[2359]: Disconnected from 178.128.102.42 port 60308 [preauth] Jan 9 01:11:32 host sshd[2792]: Invalid user daniel from 211.252.87.118 port 35688 Jan 9 01:11:32 host sshd[2792]: input_userauth_request: invalid user daniel [preauth] Jan 9 01:11:32 host sshd[2792]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:11:32 host sshd[2792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.87.118 Jan 9 01:11:34 host sshd[2792]: Failed password for invalid user daniel from 211.252.87.118 port 35688 ssh2 Jan 9 01:11:34 host sshd[2792]: Received disconnect from 211.252.87.118 port 35688:11: Bye Bye [preauth] Jan 9 01:11:34 host sshd[2792]: Disconnected from 211.252.87.118 port 35688 [preauth] Jan 9 01:12:42 host sshd[3093]: Invalid user hdfs from 190.145.12.233 port 35370 Jan 9 01:12:42 host sshd[3093]: input_userauth_request: invalid user hdfs [preauth] Jan 9 01:12:42 host sshd[3093]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:12:42 host sshd[3093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.12.233 Jan 9 01:12:43 host sshd[3093]: Failed password for invalid user hdfs from 190.145.12.233 port 35370 ssh2 Jan 9 01:12:44 host sshd[3093]: Received disconnect from 190.145.12.233 port 35370:11: Bye Bye [preauth] Jan 9 01:12:44 host sshd[3093]: Disconnected from 190.145.12.233 port 35370 [preauth] Jan 9 01:12:49 host sshd[3122]: Invalid user mike from 43.240.103.140 port 41718 Jan 9 01:12:49 host sshd[3122]: input_userauth_request: invalid user mike [preauth] Jan 9 01:12:49 host sshd[3122]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:12:49 host sshd[3122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.240.103.140 Jan 9 01:12:51 host sshd[3122]: Failed password for invalid user mike from 43.240.103.140 port 41718 ssh2 Jan 9 01:12:51 host sshd[3122]: Received disconnect from 43.240.103.140 port 41718:11: Bye Bye [preauth] Jan 9 01:12:51 host sshd[3122]: Disconnected from 43.240.103.140 port 41718 [preauth] Jan 9 01:12:55 host sshd[3139]: Invalid user bkp from 54.37.139.42 port 55806 Jan 9 01:12:55 host sshd[3139]: input_userauth_request: invalid user bkp [preauth] Jan 9 01:12:55 host sshd[3139]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:12:55 host sshd[3139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.139.42 Jan 9 01:12:56 host sshd[3139]: Failed password for invalid user bkp from 54.37.139.42 port 55806 ssh2 Jan 9 01:12:57 host sshd[3139]: Received disconnect from 54.37.139.42 port 55806:11: Bye Bye [preauth] Jan 9 01:12:57 host sshd[3139]: Disconnected from 54.37.139.42 port 55806 [preauth] Jan 9 01:13:07 host sshd[3193]: Invalid user karol from 138.2.129.140 port 56184 Jan 9 01:13:07 host sshd[3193]: input_userauth_request: invalid user karol [preauth] Jan 9 01:13:07 host sshd[3193]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:13:07 host sshd[3193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.129.140 Jan 9 01:13:08 host sshd[3197]: Invalid user carlos from 157.245.49.201 port 56670 Jan 9 01:13:08 host sshd[3197]: input_userauth_request: invalid user carlos [preauth] Jan 9 01:13:08 host sshd[3197]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:13:08 host sshd[3197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.49.201 Jan 9 01:13:09 host sshd[3193]: Failed password for invalid user karol from 138.2.129.140 port 56184 ssh2 Jan 9 01:13:09 host sshd[3193]: Received disconnect from 138.2.129.140 port 56184:11: Bye Bye [preauth] Jan 9 01:13:09 host sshd[3193]: Disconnected from 138.2.129.140 port 56184 [preauth] Jan 9 01:13:10 host sshd[3197]: Failed password for invalid user carlos from 157.245.49.201 port 56670 ssh2 Jan 9 01:13:10 host sshd[3197]: Received disconnect from 157.245.49.201 port 56670:11: Bye Bye [preauth] Jan 9 01:13:10 host sshd[3197]: Disconnected from 157.245.49.201 port 56670 [preauth] Jan 9 01:13:14 host sshd[3210]: Invalid user nginx from 23.224.102.179 port 41808 Jan 9 01:13:14 host sshd[3210]: input_userauth_request: invalid user nginx [preauth] Jan 9 01:13:14 host sshd[3210]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:13:14 host sshd[3210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.224.102.179 Jan 9 01:13:16 host sshd[3210]: Failed password for invalid user nginx from 23.224.102.179 port 41808 ssh2 Jan 9 01:13:16 host sshd[3210]: Received disconnect from 23.224.102.179 port 41808:11: Bye Bye [preauth] Jan 9 01:13:16 host sshd[3210]: Disconnected from 23.224.102.179 port 41808 [preauth] Jan 9 01:14:32 host sshd[3455]: Invalid user huang from 2.56.255.121 port 43602 Jan 9 01:14:32 host sshd[3455]: input_userauth_request: invalid user huang [preauth] Jan 9 01:14:32 host sshd[3455]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:14:32 host sshd[3455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.56.255.121 Jan 9 01:14:34 host sshd[3455]: Failed password for invalid user huang from 2.56.255.121 port 43602 ssh2 Jan 9 01:14:35 host sshd[3455]: Received disconnect from 2.56.255.121 port 43602:11: Bye Bye [preauth] Jan 9 01:14:35 host sshd[3455]: Disconnected from 2.56.255.121 port 43602 [preauth] Jan 9 01:14:41 host sshd[3472]: Invalid user albert123 from 190.145.12.233 port 59298 Jan 9 01:14:41 host sshd[3472]: input_userauth_request: invalid user albert123 [preauth] Jan 9 01:14:41 host sshd[3472]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:14:41 host sshd[3472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.12.233 Jan 9 01:14:43 host sshd[3472]: Failed password for invalid user albert123 from 190.145.12.233 port 59298 ssh2 Jan 9 01:14:44 host sshd[3472]: Received disconnect from 190.145.12.233 port 59298:11: Bye Bye [preauth] Jan 9 01:14:44 host sshd[3472]: Disconnected from 190.145.12.233 port 59298 [preauth] Jan 9 01:14:54 host sshd[3502]: Invalid user susan from 139.59.80.164 port 59068 Jan 9 01:14:54 host sshd[3502]: input_userauth_request: invalid user susan [preauth] Jan 9 01:14:54 host sshd[3502]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:14:54 host sshd[3502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.164 Jan 9 01:14:55 host sshd[3502]: Failed password for invalid user susan from 139.59.80.164 port 59068 ssh2 Jan 9 01:14:55 host sshd[3502]: Received disconnect from 139.59.80.164 port 59068:11: Bye Bye [preauth] Jan 9 01:14:55 host sshd[3502]: Disconnected from 139.59.80.164 port 59068 [preauth] Jan 9 01:15:14 host sshd[3575]: Invalid user bitwarden from 54.37.139.42 port 48390 Jan 9 01:15:14 host sshd[3575]: input_userauth_request: invalid user bitwarden [preauth] Jan 9 01:15:14 host sshd[3575]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:15:14 host sshd[3575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.139.42 Jan 9 01:15:16 host sshd[3575]: Failed password for invalid user bitwarden from 54.37.139.42 port 48390 ssh2 Jan 9 01:15:16 host sshd[3575]: Received disconnect from 54.37.139.42 port 48390:11: Bye Bye [preauth] Jan 9 01:15:16 host sshd[3575]: Disconnected from 54.37.139.42 port 48390 [preauth] Jan 9 01:15:47 host sshd[3637]: Invalid user william from 190.145.12.233 port 46530 Jan 9 01:15:47 host sshd[3637]: input_userauth_request: invalid user william [preauth] Jan 9 01:15:47 host sshd[3637]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:15:47 host sshd[3637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.12.233 Jan 9 01:15:49 host sshd[3637]: Failed password for invalid user william from 190.145.12.233 port 46530 ssh2 Jan 9 01:15:49 host sshd[3637]: Received disconnect from 190.145.12.233 port 46530:11: Bye Bye [preauth] Jan 9 01:15:49 host sshd[3637]: Disconnected from 190.145.12.233 port 46530 [preauth] Jan 9 01:15:59 host sshd[3683]: Invalid user system from 178.128.102.42 port 48556 Jan 9 01:15:59 host sshd[3683]: input_userauth_request: invalid user system [preauth] Jan 9 01:15:59 host sshd[3683]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:15:59 host sshd[3683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.102.42 Jan 9 01:16:01 host sshd[3683]: Failed password for invalid user system from 178.128.102.42 port 48556 ssh2 Jan 9 01:16:01 host sshd[3683]: Received disconnect from 178.128.102.42 port 48556:11: Bye Bye [preauth] Jan 9 01:16:01 host sshd[3683]: Disconnected from 178.128.102.42 port 48556 [preauth] Jan 9 01:16:15 host sshd[3716]: Invalid user prueba1 from 2.56.255.121 port 43038 Jan 9 01:16:15 host sshd[3716]: input_userauth_request: invalid user prueba1 [preauth] Jan 9 01:16:15 host sshd[3716]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:16:15 host sshd[3716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.56.255.121 Jan 9 01:16:17 host sshd[3722]: Invalid user test1 from 138.2.129.140 port 35400 Jan 9 01:16:17 host sshd[3722]: input_userauth_request: invalid user test1 [preauth] Jan 9 01:16:17 host sshd[3722]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:16:17 host sshd[3722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.129.140 Jan 9 01:16:17 host sshd[3716]: Failed password for invalid user prueba1 from 2.56.255.121 port 43038 ssh2 Jan 9 01:16:17 host sshd[3716]: Received disconnect from 2.56.255.121 port 43038:11: Bye Bye [preauth] Jan 9 01:16:17 host sshd[3716]: Disconnected from 2.56.255.121 port 43038 [preauth] Jan 9 01:16:19 host sshd[3722]: Failed password for invalid user test1 from 138.2.129.140 port 35400 ssh2 Jan 9 01:16:19 host sshd[3722]: Received disconnect from 138.2.129.140 port 35400:11: Bye Bye [preauth] Jan 9 01:16:19 host sshd[3722]: Disconnected from 138.2.129.140 port 35400 [preauth] Jan 9 01:16:23 host sshd[3729]: Invalid user cyril from 211.252.87.118 port 35890 Jan 9 01:16:23 host sshd[3729]: input_userauth_request: invalid user cyril [preauth] Jan 9 01:16:23 host sshd[3729]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:16:23 host sshd[3729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.87.118 Jan 9 01:16:25 host sshd[3729]: Failed password for invalid user cyril from 211.252.87.118 port 35890 ssh2 Jan 9 01:16:25 host sshd[3729]: Received disconnect from 211.252.87.118 port 35890:11: Bye Bye [preauth] Jan 9 01:16:25 host sshd[3729]: Disconnected from 211.252.87.118 port 35890 [preauth] Jan 9 01:16:28 host sshd[3757]: Invalid user rabbitmq from 157.245.49.201 port 40930 Jan 9 01:16:28 host sshd[3757]: input_userauth_request: invalid user rabbitmq [preauth] Jan 9 01:16:28 host sshd[3757]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:16:28 host sshd[3757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.49.201 Jan 9 01:16:29 host sshd[3760]: Invalid user taiga from 139.59.80.164 port 49194 Jan 9 01:16:29 host sshd[3760]: input_userauth_request: invalid user taiga [preauth] Jan 9 01:16:29 host sshd[3760]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:16:29 host sshd[3760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.164 Jan 9 01:16:30 host sshd[3757]: Failed password for invalid user rabbitmq from 157.245.49.201 port 40930 ssh2 Jan 9 01:16:30 host sshd[3757]: Received disconnect from 157.245.49.201 port 40930:11: Bye Bye [preauth] Jan 9 01:16:30 host sshd[3757]: Disconnected from 157.245.49.201 port 40930 [preauth] Jan 9 01:16:31 host sshd[3760]: Failed password for invalid user taiga from 139.59.80.164 port 49194 ssh2 Jan 9 01:16:31 host sshd[3760]: Received disconnect from 139.59.80.164 port 49194:11: Bye Bye [preauth] Jan 9 01:16:31 host sshd[3760]: Disconnected from 139.59.80.164 port 49194 [preauth] Jan 9 01:16:35 host sshd[3768]: Invalid user mike from 54.37.139.42 port 44604 Jan 9 01:16:35 host sshd[3768]: input_userauth_request: invalid user mike [preauth] Jan 9 01:16:35 host sshd[3768]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:16:35 host sshd[3768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.139.42 Jan 9 01:16:37 host sshd[3768]: Failed password for invalid user mike from 54.37.139.42 port 44604 ssh2 Jan 9 01:16:41 host sshd[3764]: Invalid user admin from 185.122.204.242 port 42854 Jan 9 01:16:41 host sshd[3764]: input_userauth_request: invalid user admin [preauth] Jan 9 01:16:41 host sshd[3764]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:16:41 host sshd[3764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 9 01:16:43 host sshd[3764]: Failed password for invalid user admin from 185.122.204.242 port 42854 ssh2 Jan 9 01:16:44 host sshd[3764]: Connection closed by 185.122.204.242 port 42854 [preauth] Jan 9 01:16:52 host sshd[3810]: Invalid user admin from 185.122.204.242 port 34954 Jan 9 01:16:52 host sshd[3810]: input_userauth_request: invalid user admin [preauth] Jan 9 01:16:52 host sshd[3810]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:16:52 host sshd[3810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 9 01:16:54 host sshd[3810]: Failed password for invalid user admin from 185.122.204.242 port 34954 ssh2 Jan 9 01:16:55 host sshd[3810]: Connection closed by 185.122.204.242 port 34954 [preauth] Jan 9 01:16:57 host sshd[3823]: Invalid user cbt from 23.224.102.179 port 54376 Jan 9 01:16:57 host sshd[3823]: input_userauth_request: invalid user cbt [preauth] Jan 9 01:16:57 host sshd[3823]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:16:57 host sshd[3823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.224.102.179 Jan 9 01:16:59 host sshd[3823]: Failed password for invalid user cbt from 23.224.102.179 port 54376 ssh2 Jan 9 01:16:59 host sshd[3823]: Received disconnect from 23.224.102.179 port 54376:11: Bye Bye [preauth] Jan 9 01:16:59 host sshd[3823]: Disconnected from 23.224.102.179 port 54376 [preauth] Jan 9 01:17:02 host sshd[3820]: Invalid user admin from 185.122.204.242 port 56806 Jan 9 01:17:02 host sshd[3820]: input_userauth_request: invalid user admin [preauth] Jan 9 01:17:02 host sshd[3820]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:17:02 host sshd[3820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 9 01:17:04 host sshd[3820]: Failed password for invalid user admin from 185.122.204.242 port 56806 ssh2 Jan 9 01:17:05 host sshd[3820]: Connection closed by 185.122.204.242 port 56806 [preauth] Jan 9 01:17:09 host sshd[3884]: Invalid user steam from 43.240.103.140 port 53396 Jan 9 01:17:09 host sshd[3884]: input_userauth_request: invalid user steam [preauth] Jan 9 01:17:09 host sshd[3884]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:17:09 host sshd[3884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.240.103.140 Jan 9 01:17:12 host sshd[3884]: Failed password for invalid user steam from 43.240.103.140 port 53396 ssh2 Jan 9 01:17:12 host sshd[3884]: Received disconnect from 43.240.103.140 port 53396:11: Bye Bye [preauth] Jan 9 01:17:12 host sshd[3884]: Disconnected from 43.240.103.140 port 53396 [preauth] Jan 9 01:17:19 host sshd[3894]: Invalid user carlos from 178.128.102.42 port 52274 Jan 9 01:17:19 host sshd[3894]: input_userauth_request: invalid user carlos [preauth] Jan 9 01:17:19 host sshd[3894]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:17:19 host sshd[3894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.102.42 Jan 9 01:17:20 host sshd[3896]: Invalid user miles from 2.56.255.121 port 38662 Jan 9 01:17:20 host sshd[3896]: input_userauth_request: invalid user miles [preauth] Jan 9 01:17:20 host sshd[3896]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:17:20 host sshd[3896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.56.255.121 Jan 9 01:17:21 host sshd[3899]: Invalid user matteo from 138.2.129.140 port 53758 Jan 9 01:17:21 host sshd[3899]: input_userauth_request: invalid user matteo [preauth] Jan 9 01:17:21 host sshd[3899]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:17:21 host sshd[3899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.129.140 Jan 9 01:17:21 host sshd[3894]: Failed password for invalid user carlos from 178.128.102.42 port 52274 ssh2 Jan 9 01:17:21 host sshd[3894]: Received disconnect from 178.128.102.42 port 52274:11: Bye Bye [preauth] Jan 9 01:17:21 host sshd[3894]: Disconnected from 178.128.102.42 port 52274 [preauth] Jan 9 01:17:22 host sshd[3896]: Failed password for invalid user miles from 2.56.255.121 port 38662 ssh2 Jan 9 01:17:23 host sshd[3899]: Failed password for invalid user matteo from 138.2.129.140 port 53758 ssh2 Jan 9 01:17:24 host sshd[3899]: Received disconnect from 138.2.129.140 port 53758:11: Bye Bye [preauth] Jan 9 01:17:24 host sshd[3899]: Disconnected from 138.2.129.140 port 53758 [preauth] Jan 9 01:17:37 host sshd[4133]: Invalid user ivan from 211.252.87.118 port 35988 Jan 9 01:17:37 host sshd[4133]: input_userauth_request: invalid user ivan [preauth] Jan 9 01:17:37 host sshd[4133]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:17:37 host sshd[4133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.87.118 Jan 9 01:17:39 host sshd[4133]: Failed password for invalid user ivan from 211.252.87.118 port 35988 ssh2 Jan 9 01:17:39 host sshd[4133]: Received disconnect from 211.252.87.118 port 35988:11: Bye Bye [preauth] Jan 9 01:17:39 host sshd[4133]: Disconnected from 211.252.87.118 port 35988 [preauth] Jan 9 01:17:53 host sshd[4183]: Invalid user comercial from 157.245.49.201 port 60560 Jan 9 01:17:53 host sshd[4183]: input_userauth_request: invalid user comercial [preauth] Jan 9 01:17:53 host sshd[4183]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:17:53 host sshd[4183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.49.201 Jan 9 01:17:55 host sshd[4183]: Failed password for invalid user comercial from 157.245.49.201 port 60560 ssh2 Jan 9 01:17:55 host sshd[4183]: Received disconnect from 157.245.49.201 port 60560:11: Bye Bye [preauth] Jan 9 01:17:55 host sshd[4183]: Disconnected from 157.245.49.201 port 60560 [preauth] Jan 9 01:18:05 host sshd[4238]: Invalid user transmission from 139.59.80.164 port 52626 Jan 9 01:18:05 host sshd[4238]: input_userauth_request: invalid user transmission [preauth] Jan 9 01:18:05 host sshd[4238]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:18:05 host sshd[4238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.164 Jan 9 01:18:07 host sshd[4238]: Failed password for invalid user transmission from 139.59.80.164 port 52626 ssh2 Jan 9 01:18:36 host sshd[4342]: Invalid user user15 from 23.224.102.179 port 53648 Jan 9 01:18:36 host sshd[4342]: input_userauth_request: invalid user user15 [preauth] Jan 9 01:18:36 host sshd[4342]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:18:36 host sshd[4342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.224.102.179 Jan 9 01:18:37 host sshd[4342]: Failed password for invalid user user15 from 23.224.102.179 port 53648 ssh2 Jan 9 01:18:37 host sshd[4342]: Received disconnect from 23.224.102.179 port 53648:11: Bye Bye [preauth] Jan 9 01:18:37 host sshd[4342]: Disconnected from 23.224.102.179 port 53648 [preauth] Jan 9 01:18:46 host sshd[4390]: Invalid user postgres from 43.240.103.140 port 48612 Jan 9 01:18:46 host sshd[4390]: input_userauth_request: invalid user postgres [preauth] Jan 9 01:18:46 host sshd[4390]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:18:46 host sshd[4390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.240.103.140 Jan 9 01:18:48 host sshd[4390]: Failed password for invalid user postgres from 43.240.103.140 port 48612 ssh2 Jan 9 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 01:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=gifterman user-11=palco123 user-12=phmetals user-13=kottayamcalldriv user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 01:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x934cVBYlkLhsWKF.~ Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x934cVBYlkLhsWKF.~' Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x934cVBYlkLhsWKF.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 01:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 01:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 01:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 01:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 01:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 01:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 01:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 01:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 01:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 01:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 01:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 01:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 01:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 01:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 01:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 01:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 01:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 01:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 01:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 01:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 01:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 01:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 01:27:59 host sshd[5901]: Invalid user fred from 107.189.30.59 port 50724 Jan 9 01:27:59 host sshd[5901]: input_userauth_request: invalid user fred [preauth] Jan 9 01:27:59 host sshd[5901]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:27:59 host sshd[5901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 9 01:28:01 host sshd[5901]: Failed password for invalid user fred from 107.189.30.59 port 50724 ssh2 Jan 9 01:28:02 host sshd[5901]: Connection closed by 107.189.30.59 port 50724 [preauth] Jan 9 01:41:15 host sshd[7687]: Invalid user bk from 194.110.203.109 port 41390 Jan 9 01:41:15 host sshd[7687]: input_userauth_request: invalid user bk [preauth] Jan 9 01:41:15 host sshd[7687]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:41:15 host sshd[7687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 01:41:16 host sshd[7687]: Failed password for invalid user bk from 194.110.203.109 port 41390 ssh2 Jan 9 01:41:20 host sshd[7687]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:41:21 host sshd[7687]: Failed password for invalid user bk from 194.110.203.109 port 41390 ssh2 Jan 9 01:41:25 host sshd[7687]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:41:27 host sshd[7687]: Failed password for invalid user bk from 194.110.203.109 port 41390 ssh2 Jan 9 01:41:30 host sshd[7687]: Connection closed by 194.110.203.109 port 41390 [preauth] Jan 9 01:41:30 host sshd[7687]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 01:50:54 host sshd[9217]: Connection closed by 107.170.227.12 port 43436 [preauth] Jan 9 01:54:09 host sshd[9697]: Did not receive identification string from 24.10.242.221 port 42671 Jan 9 01:54:22 host sshd[9720]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:22 host sshd[9720]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:22 host sshd[9722]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:22 host sshd[9722]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:22 host sshd[9723]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:22 host sshd[9723]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:23 host unix_chkpwd[9734]: password check failed for user (root) Jan 9 01:54:23 host sshd[9720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:23 host sshd[9720]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:23 host unix_chkpwd[9735]: password check failed for user (root) Jan 9 01:54:23 host sshd[9722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:23 host sshd[9722]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:23 host unix_chkpwd[9736]: password check failed for user (root) Jan 9 01:54:23 host sshd[9723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:23 host sshd[9723]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:23 host sshd[9727]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:23 host sshd[9727]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:23 host unix_chkpwd[9737]: password check failed for user (root) Jan 9 01:54:23 host sshd[9727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:23 host sshd[9727]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:23 host sshd[9729]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:23 host sshd[9729]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:24 host unix_chkpwd[9738]: password check failed for user (root) Jan 9 01:54:24 host sshd[9729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:24 host sshd[9729]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:25 host sshd[9720]: Failed password for invalid user root from 24.10.242.221 port 42708 ssh2 Jan 9 01:54:25 host sshd[9722]: Failed password for invalid user root from 24.10.242.221 port 42709 ssh2 Jan 9 01:54:25 host sshd[9723]: Failed password for invalid user root from 24.10.242.221 port 42710 ssh2 Jan 9 01:54:25 host sshd[9720]: Connection closed by 24.10.242.221 port 42708 [preauth] Jan 9 01:54:25 host sshd[9722]: Connection closed by 24.10.242.221 port 42709 [preauth] Jan 9 01:54:25 host sshd[9723]: Connection closed by 24.10.242.221 port 42710 [preauth] Jan 9 01:54:25 host sshd[9727]: Failed password for invalid user root from 24.10.242.221 port 42711 ssh2 Jan 9 01:54:25 host sshd[9729]: Failed password for invalid user root from 24.10.242.221 port 42712 ssh2 Jan 9 01:54:25 host sshd[9727]: Connection closed by 24.10.242.221 port 42711 [preauth] Jan 9 01:54:26 host sshd[9729]: Connection closed by 24.10.242.221 port 42712 [preauth] Jan 9 01:54:26 host sshd[9741]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:26 host sshd[9741]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:26 host sshd[9743]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:26 host sshd[9743]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:26 host sshd[9745]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:26 host sshd[9745]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:27 host unix_chkpwd[9762]: password check failed for user (root) Jan 9 01:54:27 host sshd[9741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:27 host sshd[9741]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:27 host unix_chkpwd[9763]: password check failed for user (root) Jan 9 01:54:27 host sshd[9743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:27 host sshd[9743]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:27 host unix_chkpwd[9764]: password check failed for user (root) Jan 9 01:54:27 host sshd[9745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:27 host sshd[9745]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:27 host sshd[9747]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:27 host sshd[9747]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:27 host sshd[9749]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:27 host sshd[9749]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:27 host unix_chkpwd[9786]: password check failed for user (root) Jan 9 01:54:27 host sshd[9747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:27 host sshd[9747]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:27 host sshd[9751]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:27 host sshd[9751]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:27 host sshd[9754]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:27 host sshd[9754]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:27 host sshd[9755]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:27 host unix_chkpwd[9792]: password check failed for user (root) Jan 9 01:54:27 host sshd[9755]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:27 host sshd[9749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:27 host sshd[9749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:27 host sshd[9758]: User root from 24.10.242.221 not allowed because not listed in AllowUsers Jan 9 01:54:27 host sshd[9758]: input_userauth_request: invalid user root [preauth] Jan 9 01:54:27 host sshd[9759]: Invalid user admin from 24.10.242.221 port 42722 Jan 9 01:54:27 host sshd[9759]: input_userauth_request: invalid user admin [preauth] Jan 9 01:54:28 host unix_chkpwd[9794]: password check failed for user (root) Jan 9 01:54:28 host sshd[9751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:28 host sshd[9751]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:28 host unix_chkpwd[9795]: password check failed for user (root) Jan 9 01:54:28 host sshd[9754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:28 host sshd[9754]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:28 host unix_chkpwd[9796]: password check failed for user (root) Jan 9 01:54:28 host sshd[9755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 user=root Jan 9 01:54:28 host sshd[9755]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 01:54:28 host sshd[9758]: Failed none for invalid user root from 24.10.242.221 port 42721 ssh2 Jan 9 01:54:28 host sshd[9759]: pam_unix(sshd:auth): check pass; user unknown Jan 9 01:54:28 host sshd[9759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.10.242.221 Jan 9 01:54:28 host sshd[9758]: Connection closed by 24.10.242.221 port 42721 [preauth] Jan 9 01:54:29 host sshd[9741]: Failed password for invalid user root from 24.10.242.221 port 42713 ssh2 Jan 9 01:54:29 host sshd[9743]: Failed password for invalid user root from 24.10.242.221 port 42714 ssh2 Jan 9 01:54:29 host sshd[9745]: Failed password for invalid user root from 24.10.242.221 port 42715 ssh2 Jan 9 01:54:29 host sshd[9747]: Failed password for invalid user root from 24.10.242.221 port 42716 ssh2 Jan 9 01:54:30 host sshd[9751]: Failed password for invalid user root from 24.10.242.221 port 42718 ssh2 Jan 9 01:54:30 host sshd[9749]: Failed password for invalid user root from 24.10.242.221 port 42717 ssh2 Jan 9 01:54:30 host sshd[9754]: Failed password for invalid user root from 24.10.242.221 port 42720 ssh2 Jan 9 01:54:30 host sshd[9755]: Failed password for invalid user root from 24.10.242.221 port 42719 ssh2 Jan 9 01:54:30 host sshd[9759]: Failed password for invalid user admin from 24.10.242.221 port 42722 ssh2 Jan 9 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 02:21:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=wwwrmswll user-7=wwwresourcehunte user-8=keralaholi user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=woodpeck user-17=wwwkapin user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=gifterman user-24=palco123 user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 02:21:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lxqpOtjysMK93Tvt.~ Jan 9 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lxqpOtjysMK93Tvt.~' Jan 9 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lxqpOtjysMK93Tvt.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 02:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 02:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 02:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 02:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 02:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:22:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 02:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 02:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 02:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 02:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:22:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 02:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 02:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:29:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 02:29:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:29:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:29:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 02:29:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:29:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=wwwpmcresource user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=pmcresources user-16=wwwkmaorg user-17=disposeat user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=kottayamcalldriv user-22=phmetals user-23=gifterman user-24=palco123 user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 02:29:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 9 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true Jan 9 02:29:54 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 02:29:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 9 02:29:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 02:29:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 9 02:29:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 02:30:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 02:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:30:02 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 02:30:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 02:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 9 02:30:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 9 02:30:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 9 02:30:03 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 02:30:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 9 02:30:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true Jan 9 02:30:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 9 02:30:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 9 02:30:12 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:30:17 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 9 02:30:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:18 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 9 02:30:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:18 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 9 02:30:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:18 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 9 02:30:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 9 02:30:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 9 02:30:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:30:19 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:20 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 9 02:30:20 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:22 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:30:22 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 9 02:30:27 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Jan 9 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:30:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance Jan 9 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get Jan 9 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:33 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 9 02:30:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:30:33 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:34 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 9 02:30:34 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 9 02:30:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 02:30:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:35 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 02:30:35 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:36 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure Jan 9 02:30:36 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:36 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:30:36 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Jan 9 02:30:37 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php Jan 9 02:30:37 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled Jan 9 02:30:37 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:30:37 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:38 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct Jan 9 02:30:38 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:30:38 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 9 02:30:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true Jan 9 02:30:38 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true Jan 9 02:30:39 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 02:30:40 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php Jan 9 02:30:40 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 02:30:40 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php Jan 9 02:30:40 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 02:30:40 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:30:40 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 02:30:40 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 9 02:30:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true Jan 9 02:30:40 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Jan 9 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:48 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Jan 9 02:30:48 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 9 02:30:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:49 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 9 02:30:49 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:49 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 9 02:30:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:49 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 9 02:30:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:30:50 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Jan 9 02:30:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Jan 9 02:30:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Jan 9 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance Jan 9 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get Jan 9 02:30:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 9 02:30:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:30:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:30:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 9 02:30:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 9 02:30:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:30:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 02:30:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:31:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 02:31:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:31:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure Jan 9 02:31:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:31:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:31:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Jan 9 02:31:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:31:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php Jan 9 02:31:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:31:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled Jan 9 02:31:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:31:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:31:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct Jan 9 02:31:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:31:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 9 02:31:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:31:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true Jan 9 02:31:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Jan 9 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Jan 9 02:31:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 9 02:31:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:31:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:31:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json Jan 9 02:31:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 9 02:31:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:31:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 9 02:31:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:31:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Jan 9 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Jan 9 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Jan 9 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance Jan 9 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get Jan 9 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 9 02:31:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:31:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 9 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 9 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure Jan 9 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Jan 9 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php Jan 9 02:31:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled Jan 9 02:31:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct Jan 9 02:31:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true Jan 9 02:31:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Jan 9 02:31:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Jan 9 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json Jan 9 02:31:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Jan 9 02:31:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:31:29 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Jan 9 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Jan 9 02:31:33 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance Jan 9 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get Jan 9 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 9 02:31:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:31:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 9 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 9 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 02:31:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 02:31:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure Jan 9 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Jan 9 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php Jan 9 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled Jan 9 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct Jan 9 02:31:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true Jan 9 02:31:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Jan 9 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Jan 9 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json Jan 9 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Jan 9 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Jan 9 02:31:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 9 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance Jan 9 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get Jan 9 02:31:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 9 02:31:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:31:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 9 02:31:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 9 02:31:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 02:31:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 02:31:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure Jan 9 02:31:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 9 02:31:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 9 02:31:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled Jan 9 02:31:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:31:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct Jan 9 02:31:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:31:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 9 02:31:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:31:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true Jan 9 02:31:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:31:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 9 02:31:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true Jan 9 02:31:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Jan 9 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Jan 9 02:32:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json Jan 9 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:32:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Jan 9 02:32:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:32:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Jan 9 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 9 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance Jan 9 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get Jan 9 02:32:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 9 02:32:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:32:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:32:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 9 02:32:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 9 02:32:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 02:32:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure Jan 9 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:32:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 9 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 9 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled Jan 9 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:32:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct Jan 9 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true Jan 9 02:32:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Jan 9 02:32:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Jan 9 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:21 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json Jan 9 02:32:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:32:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Jan 9 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Jan 9 02:32:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Jan 9 02:32:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:32:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance Jan 9 02:32:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get Jan 9 02:32:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 9 02:32:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:32:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:32:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 9 02:32:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 9 02:32:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 02:32:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 02:32:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure Jan 9 02:32:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:32:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Jan 9 02:32:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php Jan 9 02:32:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled Jan 9 02:32:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:32:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 9 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 9 02:32:30 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 9 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:32:31 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 9 02:32:31 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 9 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 9 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:32:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 9 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:32:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true Jan 9 02:32:31 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:38 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 9 02:32:38 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:39 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 9 02:32:39 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:44 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:32:44 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:44 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 9 02:32:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:32:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:32:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 9 02:32:45 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:45 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 9 02:32:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:32:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 9 02:32:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:32:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:32:46 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:47 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 9 02:32:47 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:48 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:32:48 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:53 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 9 02:32:53 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:58 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Jan 9 02:32:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:58 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:32:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:59 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance Jan 9 02:32:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:59 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get Jan 9 02:32:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:32:59 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 9 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:32:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:00 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major Jan 9 02:33:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:00 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 9 02:33:01 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:01 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 9 02:33:01 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:02 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure Jan 9 02:33:02 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:02 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:33:02 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:03 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Jan 9 02:33:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:03 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php Jan 9 02:33:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:03 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled Jan 9 02:33:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:03 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:33:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:04 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct Jan 9 02:33:04 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:04 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 9 02:33:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true Jan 9 02:33:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Jan 9 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Jan 9 02:33:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 9 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 9 02:33:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 9 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 9 02:33:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 9 02:33:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:33:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Jan 9 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 9 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Jan 9 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Jan 9 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance Jan 9 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get Jan 9 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 9 02:33:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 9 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 9 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure Jan 9 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Jan 9 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php Jan 9 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled Jan 9 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 9 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct Jan 9 02:33:23 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=dartsimp WpToolkitNotification send_admin_auto_updates_notification available_updates_text= available_updates_list= installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): Jan 9 02:33:23 host sudo: wp-toolkit : (command continued) require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website Jan 9 02:33:23 host sudo: wp-toolkit : (command continued) "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Jan 9 02:33:23 host sudo: wp-toolkit : (command continued) Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json Jan 9 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear Jan 9 02:33:23 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear Jan 9 02:33:23 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:33:23 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear Jan 9 02:33:24 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 02:33:24 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear Jan 9 02:33:24 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 02:33:24 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear Jan 9 02:33:24 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:33:24 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear Jan 9 02:33:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:33:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear Jan 9 02:33:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:33:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear Jan 9 02:33:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:33:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear Jan 9 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear Jan 9 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear Jan 9 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear Jan 9 02:33:25 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 9 02:33:25 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 9 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear Jan 9 02:33:25 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:26 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear Jan 9 02:33:26 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:26 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 9 02:33:26 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 02:33:26 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 9 02:33:26 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 02:33:27 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 9 02:33:27 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 02:33:28 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 9 02:33:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:33:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 9 02:33:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:33:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 9 02:33:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 02:33:29 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 02:33:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 9 02:33:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:33:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:33:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 9 02:33:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 02:33:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 9 02:33:30 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 02:33:30 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 9 02:33:30 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 02:33:30 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 9 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 9 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 9 02:33:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 02:59:55 host sshd[21866]: Invalid user .log from 143.244.158.100 port 38380 Jan 9 02:59:55 host sshd[21866]: input_userauth_request: invalid user .log [preauth] Jan 9 02:59:55 host sshd[21866]: pam_unix(sshd:auth): check pass; user unknown Jan 9 02:59:55 host sshd[21866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.158.100 Jan 9 02:59:56 host sshd[21866]: Failed password for invalid user .log from 143.244.158.100 port 38380 ssh2 Jan 9 02:59:56 host sshd[21866]: Received disconnect from 143.244.158.100 port 38380:11: Bye Bye [preauth] Jan 9 02:59:56 host sshd[21866]: Disconnected from 143.244.158.100 port 38380 [preauth] Jan 9 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=vfmassets user-8=wwwtestugo user-9=shalinijames user-10=wwwletsstalkfood user-11=straightcurve user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 03:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6i93DFwufMpKNh5p.~ Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6i93DFwufMpKNh5p.~' Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6i93DFwufMpKNh5p.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 03:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 03:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 03:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 03:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 03:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 03:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 03:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 03:22:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 03:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 03:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 03:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 03:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 03:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 03:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 03:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 03:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 03:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 03:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 03:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 03:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 03:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 03:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 03:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 03:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 03:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 03:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 03:41:21 host sshd[28757]: Did not receive identification string from 159.65.150.152 port 46572 Jan 9 03:42:00 host sshd[28827]: User root from 159.65.150.152 not allowed because not listed in AllowUsers Jan 9 03:42:00 host sshd[28827]: input_userauth_request: invalid user root [preauth] Jan 9 03:42:00 host unix_chkpwd[28829]: password check failed for user (root) Jan 9 03:42:00 host sshd[28827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.150.152 user=root Jan 9 03:42:00 host sshd[28827]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 03:42:02 host sshd[28827]: Failed password for invalid user root from 159.65.150.152 port 39240 ssh2 Jan 9 03:42:02 host sshd[28827]: Connection closed by 159.65.150.152 port 39240 [preauth] Jan 9 03:42:35 host sshd[28903]: Invalid user admin from 159.65.150.152 port 40592 Jan 9 03:42:35 host sshd[28903]: input_userauth_request: invalid user admin [preauth] Jan 9 03:42:35 host sshd[28903]: pam_unix(sshd:auth): check pass; user unknown Jan 9 03:42:35 host sshd[28903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.150.152 Jan 9 03:42:38 host sshd[28903]: Failed password for invalid user admin from 159.65.150.152 port 40592 ssh2 Jan 9 03:49:07 host sshd[30045]: Connection closed by 107.142.53.210 port 42940 [preauth] Jan 9 03:51:05 host sshd[30446]: Invalid user bl from 194.110.203.109 port 55550 Jan 9 03:51:05 host sshd[30446]: input_userauth_request: invalid user bl [preauth] Jan 9 03:51:05 host sshd[30446]: pam_unix(sshd:auth): check pass; user unknown Jan 9 03:51:05 host sshd[30446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 03:51:06 host sshd[30446]: Failed password for invalid user bl from 194.110.203.109 port 55550 ssh2 Jan 9 03:51:09 host sshd[30446]: pam_unix(sshd:auth): check pass; user unknown Jan 9 03:51:12 host sshd[30446]: Failed password for invalid user bl from 194.110.203.109 port 55550 ssh2 Jan 9 03:51:15 host sshd[30446]: pam_unix(sshd:auth): check pass; user unknown Jan 9 03:51:17 host sshd[30446]: Failed password for invalid user bl from 194.110.203.109 port 55550 ssh2 Jan 9 03:51:20 host sshd[30446]: Connection closed by 194.110.203.109 port 55550 [preauth] Jan 9 03:51:20 host sshd[30446]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=kottayamcalldriv user-4=phmetals user-5=palco123 user-6=gifterman user-7=straightcurve user-8=wwwletsstalkfood user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=wwwkapin user-16=woodpeck user-17=wwwkmaorg user-18=disposeat user-19=remysagr user-20=ugotscom user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 04:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LdXIWsUmYnHwPpqb.~ Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LdXIWsUmYnHwPpqb.~' Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LdXIWsUmYnHwPpqb.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 04:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 04:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 04:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 04:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 04:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 04:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 04:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 04:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 04:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 04:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 04:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 04:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 04:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 04:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 04:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 04:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 04:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 04:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 04:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 04:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 04:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 04:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 04:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 04:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 04:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 04:39:11 host sshd[4995]: Did not receive identification string from 46.101.97.107 port 61000 Jan 9 04:59:25 host sshd[7797]: Did not receive identification string from 167.71.166.243 port 50438 Jan 9 05:00:40 host sshd[7959]: Invalid user ts2 from 43.130.56.249 port 57634 Jan 9 05:00:40 host sshd[7959]: input_userauth_request: invalid user ts2 [preauth] Jan 9 05:00:40 host sshd[7959]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:00:40 host sshd[7959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.130.56.249 Jan 9 05:00:41 host sshd[7959]: Failed password for invalid user ts2 from 43.130.56.249 port 57634 ssh2 Jan 9 05:00:41 host sshd[7959]: Received disconnect from 43.130.56.249 port 57634:11: Bye Bye [preauth] Jan 9 05:00:41 host sshd[7959]: Disconnected from 43.130.56.249 port 57634 [preauth] Jan 9 05:01:05 host sshd[8011]: Invalid user otsmanager from 125.129.82.220 port 57098 Jan 9 05:01:05 host sshd[8011]: input_userauth_request: invalid user otsmanager [preauth] Jan 9 05:01:05 host sshd[8011]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:01:05 host sshd[8011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.82.220 Jan 9 05:01:07 host sshd[8011]: Failed password for invalid user otsmanager from 125.129.82.220 port 57098 ssh2 Jan 9 05:01:07 host sshd[8011]: Received disconnect from 125.129.82.220 port 57098:11: Bye Bye [preauth] Jan 9 05:01:07 host sshd[8011]: Disconnected from 125.129.82.220 port 57098 [preauth] Jan 9 05:02:07 host sshd[8252]: Invalid user ts2 from 129.226.210.53 port 34408 Jan 9 05:02:07 host sshd[8252]: input_userauth_request: invalid user ts2 [preauth] Jan 9 05:02:07 host sshd[8252]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:02:07 host sshd[8252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.210.53 Jan 9 05:02:10 host sshd[8252]: Failed password for invalid user ts2 from 129.226.210.53 port 34408 ssh2 Jan 9 05:02:10 host sshd[8252]: Received disconnect from 129.226.210.53 port 34408:11: Bye Bye [preauth] Jan 9 05:02:10 host sshd[8252]: Disconnected from 129.226.210.53 port 34408 [preauth] Jan 9 05:02:23 host sshd[8288]: Invalid user cc from 20.198.178.75 port 52902 Jan 9 05:02:23 host sshd[8288]: input_userauth_request: invalid user cc [preauth] Jan 9 05:02:23 host sshd[8288]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:02:23 host sshd[8288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.198.178.75 Jan 9 05:02:25 host sshd[8288]: Failed password for invalid user cc from 20.198.178.75 port 52902 ssh2 Jan 9 05:02:25 host sshd[8288]: Received disconnect from 20.198.178.75 port 52902:11: Bye Bye [preauth] Jan 9 05:02:25 host sshd[8288]: Disconnected from 20.198.178.75 port 52902 [preauth] Jan 9 05:03:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:03:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:03:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:03:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:03:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:03:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:03:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:03:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:03:47 host sshd[8470]: Invalid user csgoserver from 207.154.228.201 port 39976 Jan 9 05:03:47 host sshd[8470]: input_userauth_request: invalid user csgoserver [preauth] Jan 9 05:03:47 host sshd[8470]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:03:47 host sshd[8470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.228.201 Jan 9 05:03:49 host sshd[8470]: Failed password for invalid user csgoserver from 207.154.228.201 port 39976 ssh2 Jan 9 05:03:50 host sshd[8470]: Received disconnect from 207.154.228.201 port 39976:11: Bye Bye [preauth] Jan 9 05:03:50 host sshd[8470]: Disconnected from 207.154.228.201 port 39976 [preauth] Jan 9 05:04:06 host sshd[8512]: Invalid user usuario1 from 159.223.229.158 port 39688 Jan 9 05:04:06 host sshd[8512]: input_userauth_request: invalid user usuario1 [preauth] Jan 9 05:04:06 host sshd[8512]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:04:06 host sshd[8512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.229.158 Jan 9 05:04:08 host sshd[8512]: Failed password for invalid user usuario1 from 159.223.229.158 port 39688 ssh2 Jan 9 05:04:08 host sshd[8512]: Received disconnect from 159.223.229.158 port 39688:11: Bye Bye [preauth] Jan 9 05:04:08 host sshd[8512]: Disconnected from 159.223.229.158 port 39688 [preauth] Jan 9 05:04:13 host sshd[8522]: Invalid user admin from 96.227.85.22 port 38544 Jan 9 05:04:13 host sshd[8522]: input_userauth_request: invalid user admin [preauth] Jan 9 05:04:13 host sshd[8522]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:04:13 host sshd[8522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.227.85.22 Jan 9 05:04:14 host sshd[8525]: Invalid user guest from 128.199.64.114 port 32976 Jan 9 05:04:14 host sshd[8525]: input_userauth_request: invalid user guest [preauth] Jan 9 05:04:14 host sshd[8525]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:04:14 host sshd[8525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.64.114 Jan 9 05:04:15 host sshd[8525]: Failed password for invalid user guest from 128.199.64.114 port 32976 ssh2 Jan 9 05:04:15 host sshd[8525]: Received disconnect from 128.199.64.114 port 32976:11: Bye Bye [preauth] Jan 9 05:04:15 host sshd[8525]: Disconnected from 128.199.64.114 port 32976 [preauth] Jan 9 05:04:15 host sshd[8522]: Failed password for invalid user admin from 96.227.85.22 port 38544 ssh2 Jan 9 05:04:16 host sshd[8522]: Received disconnect from 96.227.85.22 port 38544:11: Bye Bye [preauth] Jan 9 05:04:16 host sshd[8522]: Disconnected from 96.227.85.22 port 38544 [preauth] Jan 9 05:05:44 host sshd[8720]: Invalid user vyos from 129.226.210.53 port 49814 Jan 9 05:05:44 host sshd[8720]: input_userauth_request: invalid user vyos [preauth] Jan 9 05:05:44 host sshd[8720]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:05:44 host sshd[8720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.210.53 Jan 9 05:05:46 host sshd[8720]: Failed password for invalid user vyos from 129.226.210.53 port 49814 ssh2 Jan 9 05:05:46 host sshd[8720]: Received disconnect from 129.226.210.53 port 49814:11: Bye Bye [preauth] Jan 9 05:05:46 host sshd[8720]: Disconnected from 129.226.210.53 port 49814 [preauth] Jan 9 05:05:49 host sshd[8726]: Invalid user luis from 207.154.228.201 port 40134 Jan 9 05:05:49 host sshd[8726]: input_userauth_request: invalid user luis [preauth] Jan 9 05:05:49 host sshd[8726]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:05:49 host sshd[8726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.228.201 Jan 9 05:05:52 host sshd[8726]: Failed password for invalid user luis from 207.154.228.201 port 40134 ssh2 Jan 9 05:05:52 host sshd[8726]: Received disconnect from 207.154.228.201 port 40134:11: Bye Bye [preauth] Jan 9 05:05:52 host sshd[8726]: Disconnected from 207.154.228.201 port 40134 [preauth] Jan 9 05:06:24 host sshd[8808]: Invalid user rochelle from 125.129.82.220 port 48090 Jan 9 05:06:24 host sshd[8808]: input_userauth_request: invalid user rochelle [preauth] Jan 9 05:06:24 host sshd[8808]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:06:24 host sshd[8808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.82.220 Jan 9 05:06:27 host sshd[8808]: Failed password for invalid user rochelle from 125.129.82.220 port 48090 ssh2 Jan 9 05:06:27 host sshd[8808]: Received disconnect from 125.129.82.220 port 48090:11: Bye Bye [preauth] Jan 9 05:06:27 host sshd[8808]: Disconnected from 125.129.82.220 port 48090 [preauth] Jan 9 05:06:44 host sshd[8859]: Invalid user ubuntu from 43.130.56.249 port 44456 Jan 9 05:06:44 host sshd[8859]: input_userauth_request: invalid user ubuntu [preauth] Jan 9 05:06:44 host sshd[8859]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:06:44 host sshd[8859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.130.56.249 Jan 9 05:06:45 host sshd[8859]: Failed password for invalid user ubuntu from 43.130.56.249 port 44456 ssh2 Jan 9 05:06:45 host sshd[8859]: Received disconnect from 43.130.56.249 port 44456:11: Bye Bye [preauth] Jan 9 05:06:45 host sshd[8859]: Disconnected from 43.130.56.249 port 44456 [preauth] Jan 9 05:06:56 host sshd[8873]: Invalid user cod4server from 207.154.228.201 port 34810 Jan 9 05:06:56 host sshd[8873]: input_userauth_request: invalid user cod4server [preauth] Jan 9 05:06:56 host sshd[8873]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:06:56 host sshd[8873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.228.201 Jan 9 05:06:57 host sshd[8880]: Invalid user admin from 129.226.210.53 port 54652 Jan 9 05:06:57 host sshd[8880]: input_userauth_request: invalid user admin [preauth] Jan 9 05:06:57 host sshd[8880]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:06:57 host sshd[8880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.210.53 Jan 9 05:06:57 host sshd[8873]: Failed password for invalid user cod4server from 207.154.228.201 port 34810 ssh2 Jan 9 05:06:58 host sshd[8873]: Received disconnect from 207.154.228.201 port 34810:11: Bye Bye [preauth] Jan 9 05:06:58 host sshd[8873]: Disconnected from 207.154.228.201 port 34810 [preauth] Jan 9 05:06:59 host sshd[8880]: Failed password for invalid user admin from 129.226.210.53 port 54652 ssh2 Jan 9 05:06:59 host sshd[8880]: Received disconnect from 129.226.210.53 port 54652:11: Bye Bye [preauth] Jan 9 05:06:59 host sshd[8880]: Disconnected from 129.226.210.53 port 54652 [preauth] Jan 9 05:07:21 host sshd[9076]: Invalid user postgres from 96.227.85.22 port 40996 Jan 9 05:07:21 host sshd[9076]: input_userauth_request: invalid user postgres [preauth] Jan 9 05:07:21 host sshd[9076]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:07:21 host sshd[9076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.227.85.22 Jan 9 05:07:22 host sshd[9076]: Failed password for invalid user postgres from 96.227.85.22 port 40996 ssh2 Jan 9 05:07:22 host sshd[9076]: Received disconnect from 96.227.85.22 port 40996:11: Bye Bye [preauth] Jan 9 05:07:22 host sshd[9076]: Disconnected from 96.227.85.22 port 40996 [preauth] Jan 9 05:07:45 host sshd[9129]: Invalid user leo from 125.129.82.220 port 45196 Jan 9 05:07:45 host sshd[9129]: input_userauth_request: invalid user leo [preauth] Jan 9 05:07:45 host sshd[9129]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:07:45 host sshd[9129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.82.220 Jan 9 05:07:48 host sshd[9129]: Failed password for invalid user leo from 125.129.82.220 port 45196 ssh2 Jan 9 05:07:48 host sshd[9129]: Received disconnect from 125.129.82.220 port 45196:11: Bye Bye [preauth] Jan 9 05:07:48 host sshd[9129]: Disconnected from 125.129.82.220 port 45196 [preauth] Jan 9 05:07:52 host sshd[9167]: Invalid user user from 43.130.56.249 port 39410 Jan 9 05:07:52 host sshd[9167]: input_userauth_request: invalid user user [preauth] Jan 9 05:07:52 host sshd[9167]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:07:52 host sshd[9167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.130.56.249 Jan 9 05:07:53 host sshd[9170]: Invalid user rob from 20.198.178.75 port 47948 Jan 9 05:07:53 host sshd[9170]: input_userauth_request: invalid user rob [preauth] Jan 9 05:07:53 host sshd[9170]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:07:53 host sshd[9170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.198.178.75 Jan 9 05:07:53 host sshd[9167]: Failed password for invalid user user from 43.130.56.249 port 39410 ssh2 Jan 9 05:07:54 host sshd[9167]: Received disconnect from 43.130.56.249 port 39410:11: Bye Bye [preauth] Jan 9 05:07:54 host sshd[9167]: Disconnected from 43.130.56.249 port 39410 [preauth] Jan 9 05:07:54 host sshd[9170]: Failed password for invalid user rob from 20.198.178.75 port 47948 ssh2 Jan 9 05:07:54 host sshd[9170]: Received disconnect from 20.198.178.75 port 47948:11: Bye Bye [preauth] Jan 9 05:07:54 host sshd[9170]: Disconnected from 20.198.178.75 port 47948 [preauth] Jan 9 05:08:08 host sshd[9242]: Invalid user postgres from 168.138.8.151 port 53422 Jan 9 05:08:08 host sshd[9242]: input_userauth_request: invalid user postgres [preauth] Jan 9 05:08:08 host sshd[9242]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:08:08 host sshd[9242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.8.151 Jan 9 05:08:09 host sshd[9242]: Failed password for invalid user postgres from 168.138.8.151 port 53422 ssh2 Jan 9 05:08:09 host sshd[9242]: Received disconnect from 168.138.8.151 port 53422:11: Bye Bye [preauth] Jan 9 05:08:09 host sshd[9242]: Disconnected from 168.138.8.151 port 53422 [preauth] Jan 9 05:08:18 host sshd[9271]: Invalid user samba from 176.102.38.41 port 40274 Jan 9 05:08:18 host sshd[9271]: input_userauth_request: invalid user samba [preauth] Jan 9 05:08:18 host sshd[9271]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:08:18 host sshd[9271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.102.38.41 Jan 9 05:08:19 host sshd[9273]: Invalid user free from 128.199.64.114 port 53422 Jan 9 05:08:19 host sshd[9273]: input_userauth_request: invalid user free [preauth] Jan 9 05:08:19 host sshd[9273]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:08:19 host sshd[9273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.64.114 Jan 9 05:08:20 host sshd[9271]: Failed password for invalid user samba from 176.102.38.41 port 40274 ssh2 Jan 9 05:08:20 host sshd[9271]: Received disconnect from 176.102.38.41 port 40274:11: Bye Bye [preauth] Jan 9 05:08:20 host sshd[9271]: Disconnected from 176.102.38.41 port 40274 [preauth] Jan 9 05:08:21 host sshd[9273]: Failed password for invalid user free from 128.199.64.114 port 53422 ssh2 Jan 9 05:08:21 host sshd[9273]: Received disconnect from 128.199.64.114 port 53422:11: Bye Bye [preauth] Jan 9 05:08:21 host sshd[9273]: Disconnected from 128.199.64.114 port 53422 [preauth] Jan 9 05:08:23 host sshd[9285]: Invalid user odoo from 96.227.85.22 port 59320 Jan 9 05:08:23 host sshd[9285]: input_userauth_request: invalid user odoo [preauth] Jan 9 05:08:23 host sshd[9285]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:08:23 host sshd[9285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.227.85.22 Jan 9 05:08:25 host sshd[9285]: Failed password for invalid user odoo from 96.227.85.22 port 59320 ssh2 Jan 9 05:08:38 host sshd[9352]: Invalid user test from 159.223.229.158 port 56246 Jan 9 05:08:38 host sshd[9352]: input_userauth_request: invalid user test [preauth] Jan 9 05:08:38 host sshd[9352]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:08:38 host sshd[9352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.229.158 Jan 9 05:08:39 host sshd[9352]: Failed password for invalid user test from 159.223.229.158 port 56246 ssh2 Jan 9 05:08:40 host sshd[9352]: Received disconnect from 159.223.229.158 port 56246:11: Bye Bye [preauth] Jan 9 05:08:40 host sshd[9352]: Disconnected from 159.223.229.158 port 56246 [preauth] Jan 9 05:09:04 host sshd[9421]: Invalid user richard from 20.198.178.75 port 43360 Jan 9 05:09:04 host sshd[9421]: input_userauth_request: invalid user richard [preauth] Jan 9 05:09:04 host sshd[9421]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:09:04 host sshd[9421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.198.178.75 Jan 9 05:09:06 host sshd[9421]: Failed password for invalid user richard from 20.198.178.75 port 43360 ssh2 Jan 9 05:09:17 host sshd[9476]: Invalid user dockeruser from 20.84.90.26 port 43882 Jan 9 05:09:17 host sshd[9476]: input_userauth_request: invalid user dockeruser [preauth] Jan 9 05:09:17 host sshd[9476]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:09:17 host sshd[9476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.84.90.26 Jan 9 05:09:19 host sshd[9476]: Failed password for invalid user dockeruser from 20.84.90.26 port 43882 ssh2 Jan 9 05:09:19 host sshd[9476]: Received disconnect from 20.84.90.26 port 43882:11: Bye Bye [preauth] Jan 9 05:09:19 host sshd[9476]: Disconnected from 20.84.90.26 port 43882 [preauth] Jan 9 05:09:42 host sshd[9536]: Invalid user jackie from 128.199.64.114 port 53614 Jan 9 05:09:42 host sshd[9536]: input_userauth_request: invalid user jackie [preauth] Jan 9 05:09:42 host sshd[9536]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:09:42 host sshd[9536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.64.114 Jan 9 05:09:44 host sshd[9536]: Failed password for invalid user jackie from 128.199.64.114 port 53614 ssh2 Jan 9 05:09:44 host sshd[9536]: Received disconnect from 128.199.64.114 port 53614:11: Bye Bye [preauth] Jan 9 05:09:44 host sshd[9536]: Disconnected from 128.199.64.114 port 53614 [preauth] Jan 9 05:09:54 host sshd[9581]: Invalid user cc from 176.102.38.41 port 54974 Jan 9 05:09:54 host sshd[9581]: input_userauth_request: invalid user cc [preauth] Jan 9 05:09:54 host sshd[9581]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:09:54 host sshd[9581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.102.38.41 Jan 9 05:09:56 host sshd[9581]: Failed password for invalid user cc from 176.102.38.41 port 54974 ssh2 Jan 9 05:09:56 host sshd[9581]: Received disconnect from 176.102.38.41 port 54974:11: Bye Bye [preauth] Jan 9 05:09:56 host sshd[9581]: Disconnected from 176.102.38.41 port 54974 [preauth] Jan 9 05:09:57 host sshd[9585]: Invalid user giovanni from 159.223.229.158 port 55170 Jan 9 05:09:57 host sshd[9585]: input_userauth_request: invalid user giovanni [preauth] Jan 9 05:09:57 host sshd[9585]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:09:57 host sshd[9585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.229.158 Jan 9 05:09:59 host sshd[9585]: Failed password for invalid user giovanni from 159.223.229.158 port 55170 ssh2 Jan 9 05:09:59 host sshd[9585]: Received disconnect from 159.223.229.158 port 55170:11: Bye Bye [preauth] Jan 9 05:09:59 host sshd[9585]: Disconnected from 159.223.229.158 port 55170 [preauth] Jan 9 05:10:17 host sshd[9680]: Connection closed by 167.71.166.243 port 46310 [preauth] Jan 9 05:10:17 host sshd[9677]: Invalid user alfresco from 119.92.70.82 port 58510 Jan 9 05:10:17 host sshd[9677]: input_userauth_request: invalid user alfresco [preauth] Jan 9 05:10:17 host sshd[9677]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:10:17 host sshd[9677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.92.70.82 Jan 9 05:10:20 host sshd[9677]: Failed password for invalid user alfresco from 119.92.70.82 port 58510 ssh2 Jan 9 05:10:20 host sshd[9677]: Received disconnect from 119.92.70.82 port 58510:11: Bye Bye [preauth] Jan 9 05:10:20 host sshd[9677]: Disconnected from 119.92.70.82 port 58510 [preauth] Jan 9 05:10:25 host sshd[9699]: Invalid user alfa from 78.159.97.30 port 51476 Jan 9 05:10:25 host sshd[9699]: input_userauth_request: invalid user alfa [preauth] Jan 9 05:10:25 host sshd[9699]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:10:25 host sshd[9699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.159.97.30 Jan 9 05:10:26 host sshd[9702]: Invalid user f from 146.190.59.39 port 40906 Jan 9 05:10:26 host sshd[9702]: input_userauth_request: invalid user f [preauth] Jan 9 05:10:26 host sshd[9702]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:10:26 host sshd[9702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.59.39 Jan 9 05:10:28 host sshd[9699]: Failed password for invalid user alfa from 78.159.97.30 port 51476 ssh2 Jan 9 05:10:28 host sshd[9699]: Received disconnect from 78.159.97.30 port 51476:11: Bye Bye [preauth] Jan 9 05:10:28 host sshd[9699]: Disconnected from 78.159.97.30 port 51476 [preauth] Jan 9 05:10:28 host sshd[9702]: Failed password for invalid user f from 146.190.59.39 port 40906 ssh2 Jan 9 05:10:28 host sshd[9702]: Received disconnect from 146.190.59.39 port 40906:11: Bye Bye [preauth] Jan 9 05:10:28 host sshd[9702]: Disconnected from 146.190.59.39 port 40906 [preauth] Jan 9 05:10:29 host sshd[9729]: Invalid user guest from 115.243.35.250 port 38334 Jan 9 05:10:29 host sshd[9729]: input_userauth_request: invalid user guest [preauth] Jan 9 05:10:29 host sshd[9729]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:10:29 host sshd[9729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.243.35.250 Jan 9 05:10:31 host sshd[9729]: Failed password for invalid user guest from 115.243.35.250 port 38334 ssh2 Jan 9 05:10:31 host sshd[9729]: Received disconnect from 115.243.35.250 port 38334:11: Bye Bye [preauth] Jan 9 05:10:31 host sshd[9729]: Disconnected from 115.243.35.250 port 38334 [preauth] Jan 9 05:11:17 host sshd[9801]: Invalid user postgres from 176.102.38.41 port 50002 Jan 9 05:11:17 host sshd[9801]: input_userauth_request: invalid user postgres [preauth] Jan 9 05:11:17 host sshd[9801]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:11:17 host sshd[9801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.102.38.41 Jan 9 05:11:19 host sshd[9801]: Failed password for invalid user postgres from 176.102.38.41 port 50002 ssh2 Jan 9 05:11:20 host sshd[9801]: Received disconnect from 176.102.38.41 port 50002:11: Bye Bye [preauth] Jan 9 05:11:20 host sshd[9801]: Disconnected from 176.102.38.41 port 50002 [preauth] Jan 9 05:11:49 host sshd[9893]: Invalid user test from 168.138.8.151 port 33380 Jan 9 05:11:49 host sshd[9893]: input_userauth_request: invalid user test [preauth] Jan 9 05:11:49 host sshd[9893]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:11:49 host sshd[9893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.8.151 Jan 9 05:11:51 host sshd[9893]: Failed password for invalid user test from 168.138.8.151 port 33380 ssh2 Jan 9 05:11:51 host sshd[9893]: Received disconnect from 168.138.8.151 port 33380:11: Bye Bye [preauth] Jan 9 05:11:51 host sshd[9893]: Disconnected from 168.138.8.151 port 33380 [preauth] Jan 9 05:11:59 host sshd[9909]: Invalid user ubuntu from 42.200.149.223 port 57212 Jan 9 05:11:59 host sshd[9909]: input_userauth_request: invalid user ubuntu [preauth] Jan 9 05:11:59 host sshd[9909]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:11:59 host sshd[9909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.149.223 Jan 9 05:12:00 host sshd[9906]: Invalid user richard from 20.84.90.26 port 44024 Jan 9 05:12:00 host sshd[9906]: input_userauth_request: invalid user richard [preauth] Jan 9 05:12:00 host sshd[9906]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:12:00 host sshd[9906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.84.90.26 Jan 9 05:12:01 host sshd[9909]: Failed password for invalid user ubuntu from 42.200.149.223 port 57212 ssh2 Jan 9 05:12:01 host sshd[9909]: Received disconnect from 42.200.149.223 port 57212:11: Bye Bye [preauth] Jan 9 05:12:01 host sshd[9909]: Disconnected from 42.200.149.223 port 57212 [preauth] Jan 9 05:12:02 host sshd[9906]: Failed password for invalid user richard from 20.84.90.26 port 44024 ssh2 Jan 9 05:12:02 host sshd[9906]: Received disconnect from 20.84.90.26 port 44024:11: Bye Bye [preauth] Jan 9 05:12:02 host sshd[9906]: Disconnected from 20.84.90.26 port 44024 [preauth] Jan 9 05:13:08 host sshd[10065]: Invalid user testuser from 20.84.90.26 port 44122 Jan 9 05:13:08 host sshd[10065]: input_userauth_request: invalid user testuser [preauth] Jan 9 05:13:08 host sshd[10065]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:13:08 host sshd[10065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.84.90.26 Jan 9 05:13:10 host sshd[10065]: Failed password for invalid user testuser from 20.84.90.26 port 44122 ssh2 Jan 9 05:13:49 host sshd[10281]: Invalid user server2 from 103.129.108.14 port 34328 Jan 9 05:13:49 host sshd[10281]: input_userauth_request: invalid user server2 [preauth] Jan 9 05:13:49 host sshd[10281]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:13:49 host sshd[10281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.108.14 Jan 9 05:13:52 host sshd[10281]: Failed password for invalid user server2 from 103.129.108.14 port 34328 ssh2 Jan 9 05:13:52 host sshd[10281]: Received disconnect from 103.129.108.14 port 34328:11: Bye Bye [preauth] Jan 9 05:13:52 host sshd[10281]: Disconnected from 103.129.108.14 port 34328 [preauth] Jan 9 05:14:06 host sshd[10312]: Invalid user cris from 168.138.8.151 port 57654 Jan 9 05:14:06 host sshd[10312]: input_userauth_request: invalid user cris [preauth] Jan 9 05:14:06 host sshd[10312]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:14:06 host sshd[10312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.8.151 Jan 9 05:14:07 host sshd[10312]: Failed password for invalid user cris from 168.138.8.151 port 57654 ssh2 Jan 9 05:14:08 host sshd[10312]: Received disconnect from 168.138.8.151 port 57654:11: Bye Bye [preauth] Jan 9 05:14:08 host sshd[10312]: Disconnected from 168.138.8.151 port 57654 [preauth] Jan 9 05:14:15 host sshd[10355]: Invalid user alfresco from 205.185.113.140 port 41818 Jan 9 05:14:15 host sshd[10355]: input_userauth_request: invalid user alfresco [preauth] Jan 9 05:14:15 host sshd[10355]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:14:15 host sshd[10355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.140 Jan 9 05:14:17 host sshd[10355]: Failed password for invalid user alfresco from 205.185.113.140 port 41818 ssh2 Jan 9 05:14:17 host sshd[10355]: Received disconnect from 205.185.113.140 port 41818:11: Bye Bye [preauth] Jan 9 05:14:17 host sshd[10355]: Disconnected from 205.185.113.140 port 41818 [preauth] Jan 9 05:14:33 host sshd[10407]: Invalid user michelle from 185.239.209.150 port 49238 Jan 9 05:14:33 host sshd[10407]: input_userauth_request: invalid user michelle [preauth] Jan 9 05:14:33 host sshd[10407]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:14:33 host sshd[10407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.239.209.150 Jan 9 05:14:34 host sshd[10407]: Failed password for invalid user michelle from 185.239.209.150 port 49238 ssh2 Jan 9 05:14:35 host sshd[10407]: Received disconnect from 185.239.209.150 port 49238:11: Bye Bye [preauth] Jan 9 05:14:35 host sshd[10407]: Disconnected from 185.239.209.150 port 49238 [preauth] Jan 9 05:15:48 host sshd[10567]: Invalid user jack from 115.243.35.250 port 36784 Jan 9 05:15:48 host sshd[10567]: input_userauth_request: invalid user jack [preauth] Jan 9 05:15:48 host sshd[10567]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:15:48 host sshd[10567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.243.35.250 Jan 9 05:15:50 host sshd[10567]: Failed password for invalid user jack from 115.243.35.250 port 36784 ssh2 Jan 9 05:15:51 host sshd[10567]: Received disconnect from 115.243.35.250 port 36784:11: Bye Bye [preauth] Jan 9 05:15:51 host sshd[10567]: Disconnected from 115.243.35.250 port 36784 [preauth] Jan 9 05:16:00 host sshd[10605]: Invalid user jack from 205.185.113.140 port 44848 Jan 9 05:16:00 host sshd[10605]: input_userauth_request: invalid user jack [preauth] Jan 9 05:16:00 host sshd[10605]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:16:00 host sshd[10605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.140 Jan 9 05:16:02 host sshd[10605]: Failed password for invalid user jack from 205.185.113.140 port 44848 ssh2 Jan 9 05:16:03 host sshd[10605]: Received disconnect from 205.185.113.140 port 44848:11: Bye Bye [preauth] Jan 9 05:16:03 host sshd[10605]: Disconnected from 205.185.113.140 port 44848 [preauth] Jan 9 05:16:03 host sshd[10622]: Invalid user jboss from 78.159.97.30 port 48220 Jan 9 05:16:03 host sshd[10622]: input_userauth_request: invalid user jboss [preauth] Jan 9 05:16:03 host sshd[10622]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:16:03 host sshd[10622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.159.97.30 Jan 9 05:16:05 host sshd[10622]: Failed password for invalid user jboss from 78.159.97.30 port 48220 ssh2 Jan 9 05:16:06 host sshd[10622]: Received disconnect from 78.159.97.30 port 48220:11: Bye Bye [preauth] Jan 9 05:16:06 host sshd[10622]: Disconnected from 78.159.97.30 port 48220 [preauth] Jan 9 05:16:13 host sshd[10648]: Invalid user isabella from 42.200.149.223 port 45472 Jan 9 05:16:13 host sshd[10648]: input_userauth_request: invalid user isabella [preauth] Jan 9 05:16:13 host sshd[10648]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:16:13 host sshd[10648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.149.223 Jan 9 05:16:15 host sshd[10652]: Invalid user isabella from 119.92.70.82 port 54048 Jan 9 05:16:15 host sshd[10652]: input_userauth_request: invalid user isabella [preauth] Jan 9 05:16:15 host sshd[10652]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:16:15 host sshd[10652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.92.70.82 Jan 9 05:16:15 host sshd[10648]: Failed password for invalid user isabella from 42.200.149.223 port 45472 ssh2 Jan 9 05:16:15 host sshd[10648]: Received disconnect from 42.200.149.223 port 45472:11: Bye Bye [preauth] Jan 9 05:16:15 host sshd[10648]: Disconnected from 42.200.149.223 port 45472 [preauth] Jan 9 05:16:17 host sshd[10652]: Failed password for invalid user isabella from 119.92.70.82 port 54048 ssh2 Jan 9 05:16:17 host sshd[10652]: Received disconnect from 119.92.70.82 port 54048:11: Bye Bye [preauth] Jan 9 05:16:17 host sshd[10652]: Disconnected from 119.92.70.82 port 54048 [preauth] Jan 9 05:16:39 host sshd[10717]: Invalid user guest from 185.239.209.150 port 35636 Jan 9 05:16:39 host sshd[10717]: input_userauth_request: invalid user guest [preauth] Jan 9 05:16:39 host sshd[10717]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:16:39 host sshd[10717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.239.209.150 Jan 9 05:16:42 host sshd[10717]: Failed password for invalid user guest from 185.239.209.150 port 35636 ssh2 Jan 9 05:16:42 host sshd[10717]: Received disconnect from 185.239.209.150 port 35636:11: Bye Bye [preauth] Jan 9 05:16:42 host sshd[10717]: Disconnected from 185.239.209.150 port 35636 [preauth] Jan 9 05:17:06 host sshd[10759]: Invalid user elena from 78.159.97.30 port 42970 Jan 9 05:17:06 host sshd[10759]: input_userauth_request: invalid user elena [preauth] Jan 9 05:17:06 host sshd[10759]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:17:06 host sshd[10759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.159.97.30 Jan 9 05:17:08 host sshd[10759]: Failed password for invalid user elena from 78.159.97.30 port 42970 ssh2 Jan 9 05:17:08 host sshd[10759]: Received disconnect from 78.159.97.30 port 42970:11: Bye Bye [preauth] Jan 9 05:17:08 host sshd[10759]: Disconnected from 78.159.97.30 port 42970 [preauth] Jan 9 05:17:09 host sshd[10765]: Invalid user ubuntu from 205.185.113.140 port 43834 Jan 9 05:17:09 host sshd[10765]: input_userauth_request: invalid user ubuntu [preauth] Jan 9 05:17:09 host sshd[10765]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:17:09 host sshd[10765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.140 Jan 9 05:17:11 host sshd[10765]: Failed password for invalid user ubuntu from 205.185.113.140 port 43834 ssh2 Jan 9 05:17:18 host sshd[10852]: Invalid user admin from 115.243.35.250 port 50711 Jan 9 05:17:18 host sshd[10852]: input_userauth_request: invalid user admin [preauth] Jan 9 05:17:18 host sshd[10852]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:17:18 host sshd[10852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.243.35.250 Jan 9 05:17:20 host sshd[10852]: Failed password for invalid user admin from 115.243.35.250 port 50711 ssh2 Jan 9 05:17:20 host sshd[10852]: Received disconnect from 115.243.35.250 port 50711:11: Bye Bye [preauth] Jan 9 05:17:20 host sshd[10852]: Disconnected from 115.243.35.250 port 50711 [preauth] Jan 9 05:17:21 host sshd[10876]: Invalid user evangeline from 146.190.59.39 port 55930 Jan 9 05:17:21 host sshd[10876]: input_userauth_request: invalid user evangeline [preauth] Jan 9 05:17:21 host sshd[10876]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:17:21 host sshd[10876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.59.39 Jan 9 05:17:22 host sshd[10890]: Invalid user jboss from 13.77.174.169 port 38662 Jan 9 05:17:22 host sshd[10890]: input_userauth_request: invalid user jboss [preauth] Jan 9 05:17:22 host sshd[10890]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:17:22 host sshd[10890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.174.169 Jan 9 05:17:24 host sshd[10876]: Failed password for invalid user evangeline from 146.190.59.39 port 55930 ssh2 Jan 9 05:17:24 host sshd[10876]: Received disconnect from 146.190.59.39 port 55930:11: Bye Bye [preauth] Jan 9 05:17:24 host sshd[10876]: Disconnected from 146.190.59.39 port 55930 [preauth] Jan 9 05:17:24 host sshd[10890]: Failed password for invalid user jboss from 13.77.174.169 port 38662 ssh2 Jan 9 05:17:24 host sshd[10890]: Received disconnect from 13.77.174.169 port 38662:11: Bye Bye [preauth] Jan 9 05:17:24 host sshd[10890]: Disconnected from 13.77.174.169 port 38662 [preauth] Jan 9 05:17:42 host sshd[10934]: Invalid user guest from 119.92.70.82 port 48382 Jan 9 05:17:42 host sshd[10934]: input_userauth_request: invalid user guest [preauth] Jan 9 05:17:42 host sshd[10934]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:17:42 host sshd[10934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.92.70.82 Jan 9 05:17:44 host sshd[10934]: Failed password for invalid user guest from 119.92.70.82 port 48382 ssh2 Jan 9 05:17:44 host sshd[10934]: Received disconnect from 119.92.70.82 port 48382:11: Bye Bye [preauth] Jan 9 05:17:44 host sshd[10934]: Disconnected from 119.92.70.82 port 48382 [preauth] Jan 9 05:17:57 host sshd[10981]: Invalid user server2 from 185.239.209.150 port 33696 Jan 9 05:17:57 host sshd[10981]: input_userauth_request: invalid user server2 [preauth] Jan 9 05:17:57 host sshd[10981]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:17:57 host sshd[10981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.239.209.150 Jan 9 05:17:59 host sshd[10981]: Failed password for invalid user server2 from 185.239.209.150 port 33696 ssh2 Jan 9 05:17:59 host sshd[10981]: Received disconnect from 185.239.209.150 port 33696:11: Bye Bye [preauth] Jan 9 05:17:59 host sshd[10981]: Disconnected from 185.239.209.150 port 33696 [preauth] Jan 9 05:18:32 host sshd[11082]: Invalid user cloud_user from 146.190.59.39 port 45048 Jan 9 05:18:32 host sshd[11082]: input_userauth_request: invalid user cloud_user [preauth] Jan 9 05:18:32 host sshd[11082]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:18:32 host sshd[11082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.59.39 Jan 9 05:18:34 host sshd[11082]: Failed password for invalid user cloud_user from 146.190.59.39 port 45048 ssh2 Jan 9 05:18:34 host sshd[11082]: Received disconnect from 146.190.59.39 port 45048:11: Bye Bye [preauth] Jan 9 05:18:34 host sshd[11082]: Disconnected from 146.190.59.39 port 45048 [preauth] Jan 9 05:18:51 host sshd[11234]: Invalid user admin from 42.200.149.223 port 45078 Jan 9 05:18:51 host sshd[11234]: input_userauth_request: invalid user admin [preauth] Jan 9 05:18:51 host sshd[11234]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:18:51 host sshd[11234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.149.223 Jan 9 05:18:52 host sshd[11234]: Failed password for invalid user admin from 42.200.149.223 port 45078 ssh2 Jan 9 05:18:52 host sshd[11234]: Received disconnect from 42.200.149.223 port 45078:11: Bye Bye [preauth] Jan 9 05:18:52 host sshd[11234]: Disconnected from 42.200.149.223 port 45078 [preauth] Jan 9 05:19:11 host sshd[11306]: Invalid user serveur from 13.77.174.169 port 41602 Jan 9 05:19:11 host sshd[11306]: input_userauth_request: invalid user serveur [preauth] Jan 9 05:19:11 host sshd[11306]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:19:11 host sshd[11306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.174.169 Jan 9 05:19:14 host sshd[11306]: Failed password for invalid user serveur from 13.77.174.169 port 41602 ssh2 Jan 9 05:19:14 host sshd[11306]: Received disconnect from 13.77.174.169 port 41602:11: Bye Bye [preauth] Jan 9 05:19:14 host sshd[11306]: Disconnected from 13.77.174.169 port 41602 [preauth] Jan 9 05:19:25 host sshd[11330]: Invalid user evangeline from 103.129.108.14 port 41033 Jan 9 05:19:25 host sshd[11330]: input_userauth_request: invalid user evangeline [preauth] Jan 9 05:19:25 host sshd[11330]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:19:25 host sshd[11330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.108.14 Jan 9 05:19:27 host sshd[11330]: Failed password for invalid user evangeline from 103.129.108.14 port 41033 ssh2 Jan 9 05:19:27 host sshd[11330]: Received disconnect from 103.129.108.14 port 41033:11: Bye Bye [preauth] Jan 9 05:19:27 host sshd[11330]: Disconnected from 103.129.108.14 port 41033 [preauth] Jan 9 05:20:29 host sshd[11482]: Invalid user sanjay from 13.77.174.169 port 41098 Jan 9 05:20:29 host sshd[11482]: input_userauth_request: invalid user sanjay [preauth] Jan 9 05:20:29 host sshd[11482]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:20:29 host sshd[11482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.174.169 Jan 9 05:20:31 host sshd[11482]: Failed password for invalid user sanjay from 13.77.174.169 port 41098 ssh2 Jan 9 05:21:23 host sshd[11634]: Invalid user consulta from 103.129.108.14 port 41464 Jan 9 05:21:23 host sshd[11634]: input_userauth_request: invalid user consulta [preauth] Jan 9 05:21:23 host sshd[11634]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:21:23 host sshd[11634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.108.14 Jan 9 05:21:25 host sshd[11634]: Failed password for invalid user consulta from 103.129.108.14 port 41464 ssh2 Jan 9 05:21:25 host sshd[11634]: Received disconnect from 103.129.108.14 port 41464:11: Bye Bye [preauth] Jan 9 05:21:25 host sshd[11634]: Disconnected from 103.129.108.14 port 41464 [preauth] Jan 9 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwrmswll user-10=keralaholi user-11=wwwresourcehunte user-12=disposeat user-13=remysagr user-14=wwwkmaorg user-15=wwwkapin user-16=woodpeck user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=phmetals user-26=kottayamcalldriv user-27=gifterman user-28=palco123 user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 05:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 05:21:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 05:21:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 9 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 9 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-cBMxSjxiW6nB1PgM.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-cBMxSjxiW6nB1PgM.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 9 05:21:59 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 9 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-ssOeXkNiqWoa6Mv1.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-ssOeXkNiqWoa6Mv1.wp-toolkit-identifier Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-79XJDRmJerDmdnnZ.~ Jan 9 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-79XJDRmJerDmdnnZ.~' Jan 9 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-79XJDRmJerDmdnnZ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 05:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 05:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 05:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 05:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 05:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 05:22:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 05:22:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 05:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 05:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 05:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 05:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 05:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 05:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 05:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 05:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 05:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 05:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 05:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 05:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 05:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 05:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 05:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 05:22:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 05:22:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 05:24:44 host sshd[12637]: Invalid user f from 178.64.190.253 port 49380 Jan 9 05:24:44 host sshd[12637]: input_userauth_request: invalid user f [preauth] Jan 9 05:24:44 host sshd[12637]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:24:44 host sshd[12637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.64.190.253 Jan 9 05:24:46 host sshd[12637]: Failed password for invalid user f from 178.64.190.253 port 49380 ssh2 Jan 9 05:24:47 host sshd[12637]: Received disconnect from 178.64.190.253 port 49380:11: Bye Bye [preauth] Jan 9 05:24:47 host sshd[12637]: Disconnected from 178.64.190.253 port 49380 [preauth] Jan 9 05:28:20 host sshd[13282]: Invalid user ubuntu from 178.64.190.253 port 48356 Jan 9 05:28:20 host sshd[13282]: input_userauth_request: invalid user ubuntu [preauth] Jan 9 05:28:20 host sshd[13282]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:28:20 host sshd[13282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.64.190.253 Jan 9 05:28:22 host sshd[13282]: Failed password for invalid user ubuntu from 178.64.190.253 port 48356 ssh2 Jan 9 05:28:22 host sshd[13282]: Received disconnect from 178.64.190.253 port 48356:11: Bye Bye [preauth] Jan 9 05:28:22 host sshd[13282]: Disconnected from 178.64.190.253 port 48356 [preauth] Jan 9 05:28:39 host sshd[13359]: Invalid user .log from 143.244.158.100 port 38830 Jan 9 05:28:39 host sshd[13359]: input_userauth_request: invalid user .log [preauth] Jan 9 05:28:39 host sshd[13359]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:28:39 host sshd[13359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.158.100 Jan 9 05:28:41 host sshd[13359]: Failed password for invalid user .log from 143.244.158.100 port 38830 ssh2 Jan 9 05:28:41 host sshd[13359]: Received disconnect from 143.244.158.100 port 38830:11: Bye Bye [preauth] Jan 9 05:28:41 host sshd[13359]: Disconnected from 143.244.158.100 port 38830 [preauth] Jan 9 05:31:19 host sshd[13935]: Invalid user cloud_user from 178.64.190.253 port 35988 Jan 9 05:31:19 host sshd[13935]: input_userauth_request: invalid user cloud_user [preauth] Jan 9 05:31:19 host sshd[13935]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:31:19 host sshd[13935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.64.190.253 Jan 9 05:31:21 host sshd[13935]: Failed password for invalid user cloud_user from 178.64.190.253 port 35988 ssh2 Jan 9 05:33:05 host sshd[14263]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 9 05:33:05 host sshd[14263]: input_userauth_request: invalid user root [preauth] Jan 9 05:33:05 host unix_chkpwd[14266]: password check failed for user (root) Jan 9 05:33:05 host sshd[14263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 9 05:33:05 host sshd[14263]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 05:33:07 host sshd[14263]: Failed password for invalid user root from 194.169.175.102 port 59775 ssh2 Jan 9 05:33:07 host sshd[14263]: Received disconnect from 194.169.175.102 port 59775:11: Client disconnecting normally [preauth] Jan 9 05:33:07 host sshd[14263]: Disconnected from 194.169.175.102 port 59775 [preauth] Jan 9 05:34:32 host sshd[14522]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 9 05:34:32 host sshd[14522]: input_userauth_request: invalid user root [preauth] Jan 9 05:34:32 host unix_chkpwd[14525]: password check failed for user (root) Jan 9 05:34:32 host sshd[14522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 9 05:34:32 host sshd[14522]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 05:34:34 host sshd[14522]: Failed password for invalid user root from 195.226.194.242 port 41908 ssh2 Jan 9 05:34:34 host sshd[14522]: Received disconnect from 195.226.194.242 port 41908:11: Bye Bye [preauth] Jan 9 05:34:34 host sshd[14522]: Disconnected from 195.226.194.242 port 41908 [preauth] Jan 9 05:34:57 host sshd[14567]: Invalid user ester from 67.164.27.145 port 51312 Jan 9 05:34:57 host sshd[14567]: input_userauth_request: invalid user ester [preauth] Jan 9 05:34:57 host sshd[14567]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:34:57 host sshd[14567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.164.27.145 Jan 9 05:34:59 host sshd[14567]: Failed password for invalid user ester from 67.164.27.145 port 51312 ssh2 Jan 9 05:34:59 host sshd[14567]: Received disconnect from 67.164.27.145 port 51312:11: Bye Bye [preauth] Jan 9 05:34:59 host sshd[14567]: Disconnected from 67.164.27.145 port 51312 [preauth] Jan 9 05:36:34 host sshd[15047]: Invalid user andy from 35.224.2.98 port 40506 Jan 9 05:36:34 host sshd[15047]: input_userauth_request: invalid user andy [preauth] Jan 9 05:36:34 host sshd[15047]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:36:34 host sshd[15047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.224.2.98 Jan 9 05:36:36 host sshd[15047]: Failed password for invalid user andy from 35.224.2.98 port 40506 ssh2 Jan 9 05:36:36 host sshd[15047]: Received disconnect from 35.224.2.98 port 40506:11: Bye Bye [preauth] Jan 9 05:36:36 host sshd[15047]: Disconnected from 35.224.2.98 port 40506 [preauth] Jan 9 05:37:16 host sshd[15198]: Invalid user amir from 103.13.207.4 port 39056 Jan 9 05:37:16 host sshd[15198]: input_userauth_request: invalid user amir [preauth] Jan 9 05:37:16 host sshd[15198]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:37:16 host sshd[15198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.207.4 Jan 9 05:37:18 host sshd[15198]: Failed password for invalid user amir from 103.13.207.4 port 39056 ssh2 Jan 9 05:37:19 host sshd[15198]: Received disconnect from 103.13.207.4 port 39056:11: Bye Bye [preauth] Jan 9 05:37:19 host sshd[15198]: Disconnected from 103.13.207.4 port 39056 [preauth] Jan 9 05:37:39 host sshd[15298]: Invalid user docker from 200.70.56.202 port 41222 Jan 9 05:37:39 host sshd[15298]: input_userauth_request: invalid user docker [preauth] Jan 9 05:37:39 host sshd[15298]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:37:39 host sshd[15298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.202 Jan 9 05:37:41 host sshd[15298]: Failed password for invalid user docker from 200.70.56.202 port 41222 ssh2 Jan 9 05:37:41 host sshd[15298]: Received disconnect from 200.70.56.202 port 41222:11: Bye Bye [preauth] Jan 9 05:37:41 host sshd[15298]: Disconnected from 200.70.56.202 port 41222 [preauth] Jan 9 05:39:06 host sshd[15568]: Invalid user user from 67.164.27.145 port 54600 Jan 9 05:39:06 host sshd[15568]: input_userauth_request: invalid user user [preauth] Jan 9 05:39:06 host sshd[15568]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:39:06 host sshd[15568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.164.27.145 Jan 9 05:39:08 host sshd[15568]: Failed password for invalid user user from 67.164.27.145 port 54600 ssh2 Jan 9 05:39:08 host sshd[15568]: Received disconnect from 67.164.27.145 port 54600:11: Bye Bye [preauth] Jan 9 05:39:08 host sshd[15568]: Disconnected from 67.164.27.145 port 54600 [preauth] Jan 9 05:39:23 host sshd[15603]: Invalid user simon from 35.224.2.98 port 54006 Jan 9 05:39:23 host sshd[15603]: input_userauth_request: invalid user simon [preauth] Jan 9 05:39:23 host sshd[15603]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:39:23 host sshd[15603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.224.2.98 Jan 9 05:39:25 host sshd[15603]: Failed password for invalid user simon from 35.224.2.98 port 54006 ssh2 Jan 9 05:39:25 host sshd[15603]: Received disconnect from 35.224.2.98 port 54006:11: Bye Bye [preauth] Jan 9 05:39:25 host sshd[15603]: Disconnected from 35.224.2.98 port 54006 [preauth] Jan 9 05:40:17 host sshd[15774]: Invalid user elvis from 67.164.27.145 port 57344 Jan 9 05:40:17 host sshd[15774]: input_userauth_request: invalid user elvis [preauth] Jan 9 05:40:17 host sshd[15774]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:40:17 host sshd[15774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.164.27.145 Jan 9 05:40:19 host sshd[15774]: Failed password for invalid user elvis from 67.164.27.145 port 57344 ssh2 Jan 9 05:40:19 host sshd[15774]: Received disconnect from 67.164.27.145 port 57344:11: Bye Bye [preauth] Jan 9 05:40:19 host sshd[15774]: Disconnected from 67.164.27.145 port 57344 [preauth] Jan 9 05:40:27 host sshd[15830]: Invalid user andy from 103.13.207.4 port 46724 Jan 9 05:40:27 host sshd[15830]: input_userauth_request: invalid user andy [preauth] Jan 9 05:40:27 host sshd[15830]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:40:27 host sshd[15830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.207.4 Jan 9 05:40:29 host sshd[15830]: Failed password for invalid user andy from 103.13.207.4 port 46724 ssh2 Jan 9 05:40:29 host sshd[15838]: Invalid user ftpuser from 35.224.2.98 port 53304 Jan 9 05:40:29 host sshd[15838]: input_userauth_request: invalid user ftpuser [preauth] Jan 9 05:40:29 host sshd[15838]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:40:29 host sshd[15838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.224.2.98 Jan 9 05:40:29 host sshd[15830]: Received disconnect from 103.13.207.4 port 46724:11: Bye Bye [preauth] Jan 9 05:40:29 host sshd[15830]: Disconnected from 103.13.207.4 port 46724 [preauth] Jan 9 05:40:31 host sshd[15838]: Failed password for invalid user ftpuser from 35.224.2.98 port 53304 ssh2 Jan 9 05:40:31 host sshd[15838]: Received disconnect from 35.224.2.98 port 53304:11: Bye Bye [preauth] Jan 9 05:40:31 host sshd[15838]: Disconnected from 35.224.2.98 port 53304 [preauth] Jan 9 05:41:22 host sshd[16108]: Invalid user ftpuser from 200.70.56.202 port 55034 Jan 9 05:41:22 host sshd[16108]: input_userauth_request: invalid user ftpuser [preauth] Jan 9 05:41:22 host sshd[16108]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:41:22 host sshd[16108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.202 Jan 9 05:41:24 host sshd[16108]: Failed password for invalid user ftpuser from 200.70.56.202 port 55034 ssh2 Jan 9 05:41:24 host sshd[16108]: Received disconnect from 200.70.56.202 port 55034:11: Bye Bye [preauth] Jan 9 05:41:24 host sshd[16108]: Disconnected from 200.70.56.202 port 55034 [preauth] Jan 9 05:41:44 host sshd[16177]: Invalid user project from 103.13.207.4 port 42120 Jan 9 05:41:44 host sshd[16177]: input_userauth_request: invalid user project [preauth] Jan 9 05:41:44 host sshd[16177]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:41:44 host sshd[16177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.13.207.4 Jan 9 05:41:45 host sshd[16177]: Failed password for invalid user project from 103.13.207.4 port 42120 ssh2 Jan 9 05:41:45 host sshd[16177]: Received disconnect from 103.13.207.4 port 42120:11: Bye Bye [preauth] Jan 9 05:41:45 host sshd[16177]: Disconnected from 103.13.207.4 port 42120 [preauth] Jan 9 05:42:39 host sshd[16314]: Invalid user postgres from 45.207.38.93 port 48300 Jan 9 05:42:39 host sshd[16314]: input_userauth_request: invalid user postgres [preauth] Jan 9 05:42:39 host sshd[16314]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:42:39 host sshd[16314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.207.38.93 Jan 9 05:42:41 host sshd[16314]: Failed password for invalid user postgres from 45.207.38.93 port 48300 ssh2 Jan 9 05:42:42 host sshd[16314]: Received disconnect from 45.207.38.93 port 48300:11: Bye Bye [preauth] Jan 9 05:42:42 host sshd[16314]: Disconnected from 45.207.38.93 port 48300 [preauth] Jan 9 05:43:06 host sshd[16358]: Invalid user test from 200.70.56.202 port 54908 Jan 9 05:43:06 host sshd[16358]: input_userauth_request: invalid user test [preauth] Jan 9 05:43:06 host sshd[16358]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:43:06 host sshd[16358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.202 Jan 9 05:43:08 host sshd[16358]: Failed password for invalid user test from 200.70.56.202 port 54908 ssh2 Jan 9 05:43:09 host sshd[16358]: Received disconnect from 200.70.56.202 port 54908:11: Bye Bye [preauth] Jan 9 05:43:09 host sshd[16358]: Disconnected from 200.70.56.202 port 54908 [preauth] Jan 9 05:44:53 host sshd[16590]: Invalid user jimmy from 75.119.133.26 port 47280 Jan 9 05:44:53 host sshd[16590]: input_userauth_request: invalid user jimmy [preauth] Jan 9 05:44:53 host sshd[16590]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:44:53 host sshd[16590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.119.133.26 Jan 9 05:44:56 host sshd[16590]: Failed password for invalid user jimmy from 75.119.133.26 port 47280 ssh2 Jan 9 05:44:56 host sshd[16590]: Received disconnect from 75.119.133.26 port 47280:11: Bye Bye [preauth] Jan 9 05:44:56 host sshd[16590]: Disconnected from 75.119.133.26 port 47280 [preauth] Jan 9 05:45:49 host sshd[16713]: Invalid user admin from 154.16.115.170 port 53730 Jan 9 05:45:49 host sshd[16713]: input_userauth_request: invalid user admin [preauth] Jan 9 05:45:49 host sshd[16713]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:45:49 host sshd[16713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.16.115.170 Jan 9 05:45:52 host sshd[16713]: Failed password for invalid user admin from 154.16.115.170 port 53730 ssh2 Jan 9 05:45:52 host sshd[16713]: Received disconnect from 154.16.115.170 port 53730:11: Bye Bye [preauth] Jan 9 05:45:52 host sshd[16713]: Disconnected from 154.16.115.170 port 53730 [preauth] Jan 9 05:46:05 host sshd[16738]: Invalid user admin from 76.95.32.130 port 60506 Jan 9 05:46:05 host sshd[16738]: input_userauth_request: invalid user admin [preauth] Jan 9 05:46:05 host sshd[16738]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:46:05 host sshd[16738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.95.32.130 Jan 9 05:46:07 host sshd[16738]: Failed password for invalid user admin from 76.95.32.130 port 60506 ssh2 Jan 9 05:46:07 host sshd[16738]: Received disconnect from 76.95.32.130 port 60506:11: Bye Bye [preauth] Jan 9 05:46:07 host sshd[16738]: Disconnected from 76.95.32.130 port 60506 [preauth] Jan 9 05:46:34 host sshd[16903]: Invalid user user from 45.207.38.93 port 53054 Jan 9 05:46:34 host sshd[16903]: input_userauth_request: invalid user user [preauth] Jan 9 05:46:34 host sshd[16903]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:46:34 host sshd[16903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.207.38.93 Jan 9 05:46:36 host sshd[16903]: Failed password for invalid user user from 45.207.38.93 port 53054 ssh2 Jan 9 05:46:36 host sshd[16903]: Received disconnect from 45.207.38.93 port 53054:11: Bye Bye [preauth] Jan 9 05:46:36 host sshd[16903]: Disconnected from 45.207.38.93 port 53054 [preauth] Jan 9 05:46:41 host sshd[16913]: Invalid user alfred from 51.158.175.97 port 55814 Jan 9 05:46:41 host sshd[16913]: input_userauth_request: invalid user alfred [preauth] Jan 9 05:46:41 host sshd[16913]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:46:41 host sshd[16913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.175.97 Jan 9 05:46:43 host sshd[16913]: Failed password for invalid user alfred from 51.158.175.97 port 55814 ssh2 Jan 9 05:46:43 host sshd[16913]: Received disconnect from 51.158.175.97 port 55814:11: Bye Bye [preauth] Jan 9 05:46:43 host sshd[16913]: Disconnected from 51.158.175.97 port 55814 [preauth] Jan 9 05:48:24 host sshd[17087]: Invalid user ubuntu from 222.252.11.10 port 64993 Jan 9 05:48:24 host sshd[17087]: input_userauth_request: invalid user ubuntu [preauth] Jan 9 05:48:24 host sshd[17087]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:48:24 host sshd[17087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.11.10 Jan 9 05:48:26 host sshd[17087]: Failed password for invalid user ubuntu from 222.252.11.10 port 64993 ssh2 Jan 9 05:48:27 host sshd[17087]: Received disconnect from 222.252.11.10 port 64993:11: Bye Bye [preauth] Jan 9 05:48:27 host sshd[17087]: Disconnected from 222.252.11.10 port 64993 [preauth] Jan 9 05:48:30 host sshd[17117]: Invalid user dasusr1 from 206.189.42.174 port 53626 Jan 9 05:48:30 host sshd[17117]: input_userauth_request: invalid user dasusr1 [preauth] Jan 9 05:48:30 host sshd[17117]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:48:30 host sshd[17117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.42.174 Jan 9 05:48:32 host sshd[17117]: Failed password for invalid user dasusr1 from 206.189.42.174 port 53626 ssh2 Jan 9 05:48:32 host sshd[17117]: Received disconnect from 206.189.42.174 port 53626:11: Bye Bye [preauth] Jan 9 05:48:32 host sshd[17117]: Disconnected from 206.189.42.174 port 53626 [preauth] Jan 9 05:49:28 host sshd[17203]: Invalid user sergio from 20.119.249.229 port 1024 Jan 9 05:49:28 host sshd[17203]: input_userauth_request: invalid user sergio [preauth] Jan 9 05:49:28 host sshd[17203]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:49:28 host sshd[17203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.119.249.229 Jan 9 05:49:29 host sshd[17203]: Failed password for invalid user sergio from 20.119.249.229 port 1024 ssh2 Jan 9 05:49:30 host sshd[17203]: Received disconnect from 20.119.249.229 port 1024:11: Bye Bye [preauth] Jan 9 05:49:30 host sshd[17203]: Disconnected from 20.119.249.229 port 1024 [preauth] Jan 9 05:49:48 host sshd[17243]: Invalid user bitnami from 45.207.38.93 port 52534 Jan 9 05:49:48 host sshd[17243]: input_userauth_request: invalid user bitnami [preauth] Jan 9 05:49:48 host sshd[17243]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:49:48 host sshd[17243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.207.38.93 Jan 9 05:49:50 host sshd[17243]: Failed password for invalid user bitnami from 45.207.38.93 port 52534 ssh2 Jan 9 05:50:02 host sshd[17307]: Invalid user shalini from 51.158.175.97 port 50268 Jan 9 05:50:02 host sshd[17307]: input_userauth_request: invalid user shalini [preauth] Jan 9 05:50:02 host sshd[17307]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:50:02 host sshd[17307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.175.97 Jan 9 05:50:04 host sshd[17307]: Failed password for invalid user shalini from 51.158.175.97 port 50268 ssh2 Jan 9 05:50:04 host sshd[17307]: Received disconnect from 51.158.175.97 port 50268:11: Bye Bye [preauth] Jan 9 05:50:04 host sshd[17307]: Disconnected from 51.158.175.97 port 50268 [preauth] Jan 9 05:50:42 host sshd[17412]: Invalid user miner from 75.119.133.26 port 48624 Jan 9 05:50:42 host sshd[17412]: input_userauth_request: invalid user miner [preauth] Jan 9 05:50:42 host sshd[17412]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:50:42 host sshd[17412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.119.133.26 Jan 9 05:50:44 host sshd[17412]: Failed password for invalid user miner from 75.119.133.26 port 48624 ssh2 Jan 9 05:50:44 host sshd[17412]: Received disconnect from 75.119.133.26 port 48624:11: Bye Bye [preauth] Jan 9 05:50:44 host sshd[17412]: Disconnected from 75.119.133.26 port 48624 [preauth] Jan 9 05:50:49 host sshd[17422]: Invalid user ftp2 from 154.16.115.170 port 55304 Jan 9 05:50:49 host sshd[17422]: input_userauth_request: invalid user ftp2 [preauth] Jan 9 05:50:49 host sshd[17422]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:50:49 host sshd[17422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.16.115.170 Jan 9 05:50:51 host sshd[17422]: Failed password for invalid user ftp2 from 154.16.115.170 port 55304 ssh2 Jan 9 05:50:51 host sshd[17422]: Received disconnect from 154.16.115.170 port 55304:11: Bye Bye [preauth] Jan 9 05:50:51 host sshd[17422]: Disconnected from 154.16.115.170 port 55304 [preauth] Jan 9 05:50:59 host sshd[17436]: Invalid user sdtdserver from 76.95.32.130 port 48978 Jan 9 05:50:59 host sshd[17436]: input_userauth_request: invalid user sdtdserver [preauth] Jan 9 05:50:59 host sshd[17436]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:50:59 host sshd[17436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.95.32.130 Jan 9 05:51:00 host sshd[17436]: Failed password for invalid user sdtdserver from 76.95.32.130 port 48978 ssh2 Jan 9 05:51:01 host sshd[17436]: Received disconnect from 76.95.32.130 port 48978:11: Bye Bye [preauth] Jan 9 05:51:01 host sshd[17436]: Disconnected from 76.95.32.130 port 48978 [preauth] Jan 9 05:51:12 host sshd[17485]: Invalid user deployer from 51.158.175.97 port 50614 Jan 9 05:51:12 host sshd[17485]: input_userauth_request: invalid user deployer [preauth] Jan 9 05:51:12 host sshd[17485]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:51:12 host sshd[17485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.175.97 Jan 9 05:51:13 host sshd[17485]: Failed password for invalid user deployer from 51.158.175.97 port 50614 ssh2 Jan 9 05:51:14 host sshd[17485]: Received disconnect from 51.158.175.97 port 50614:11: Bye Bye [preauth] Jan 9 05:51:14 host sshd[17485]: Disconnected from 51.158.175.97 port 50614 [preauth] Jan 9 05:51:20 host sshd[17530]: Invalid user alfred from 20.119.249.229 port 1024 Jan 9 05:51:20 host sshd[17530]: input_userauth_request: invalid user alfred [preauth] Jan 9 05:51:20 host sshd[17530]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:51:20 host sshd[17530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.119.249.229 Jan 9 05:51:23 host sshd[17530]: Failed password for invalid user alfred from 20.119.249.229 port 1024 ssh2 Jan 9 05:51:23 host sshd[17530]: Received disconnect from 20.119.249.229 port 1024:11: Bye Bye [preauth] Jan 9 05:51:23 host sshd[17530]: Disconnected from 20.119.249.229 port 1024 [preauth] Jan 9 05:51:31 host sshd[17569]: Invalid user sdtdserver from 206.189.42.174 port 43300 Jan 9 05:51:31 host sshd[17569]: input_userauth_request: invalid user sdtdserver [preauth] Jan 9 05:51:31 host sshd[17569]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:51:31 host sshd[17569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.42.174 Jan 9 05:51:33 host sshd[17569]: Failed password for invalid user sdtdserver from 206.189.42.174 port 43300 ssh2 Jan 9 05:51:33 host sshd[17569]: Received disconnect from 206.189.42.174 port 43300:11: Bye Bye [preauth] Jan 9 05:51:33 host sshd[17569]: Disconnected from 206.189.42.174 port 43300 [preauth] Jan 9 05:51:46 host sshd[17584]: Invalid user jimmy from 154.16.115.170 port 43138 Jan 9 05:51:46 host sshd[17584]: input_userauth_request: invalid user jimmy [preauth] Jan 9 05:51:46 host sshd[17584]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:51:46 host sshd[17584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.16.115.170 Jan 9 05:51:47 host sshd[17584]: Failed password for invalid user jimmy from 154.16.115.170 port 43138 ssh2 Jan 9 05:52:00 host sshd[17737]: Invalid user teamspeak from 222.252.11.10 port 42545 Jan 9 05:52:00 host sshd[17737]: input_userauth_request: invalid user teamspeak [preauth] Jan 9 05:52:00 host sshd[17737]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:52:00 host sshd[17737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.11.10 Jan 9 05:52:02 host sshd[17737]: Failed password for invalid user teamspeak from 222.252.11.10 port 42545 ssh2 Jan 9 05:52:02 host sshd[17737]: Received disconnect from 222.252.11.10 port 42545:11: Bye Bye [preauth] Jan 9 05:52:02 host sshd[17737]: Disconnected from 222.252.11.10 port 42545 [preauth] Jan 9 05:52:04 host sshd[17752]: Invalid user alfred from 75.119.133.26 port 47772 Jan 9 05:52:04 host sshd[17752]: input_userauth_request: invalid user alfred [preauth] Jan 9 05:52:04 host sshd[17752]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:52:04 host sshd[17752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.119.133.26 Jan 9 05:52:06 host sshd[17752]: Failed password for invalid user alfred from 75.119.133.26 port 47772 ssh2 Jan 9 05:52:06 host sshd[17752]: Received disconnect from 75.119.133.26 port 47772:11: Bye Bye [preauth] Jan 9 05:52:06 host sshd[17752]: Disconnected from 75.119.133.26 port 47772 [preauth] Jan 9 05:52:08 host sshd[17787]: Invalid user miner from 76.95.32.130 port 35114 Jan 9 05:52:08 host sshd[17787]: input_userauth_request: invalid user miner [preauth] Jan 9 05:52:08 host sshd[17787]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:52:08 host sshd[17787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.95.32.130 Jan 9 05:52:10 host sshd[17787]: Failed password for invalid user miner from 76.95.32.130 port 35114 ssh2 Jan 9 05:52:11 host sshd[17787]: Received disconnect from 76.95.32.130 port 35114:11: Bye Bye [preauth] Jan 9 05:52:11 host sshd[17787]: Disconnected from 76.95.32.130 port 35114 [preauth] Jan 9 05:52:38 host sshd[17898]: Invalid user deployer from 20.119.249.229 port 1024 Jan 9 05:52:38 host sshd[17898]: input_userauth_request: invalid user deployer [preauth] Jan 9 05:52:38 host sshd[17898]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:52:38 host sshd[17898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.119.249.229 Jan 9 05:52:40 host sshd[17898]: Failed password for invalid user deployer from 20.119.249.229 port 1024 ssh2 Jan 9 05:52:41 host sshd[17898]: Received disconnect from 20.119.249.229 port 1024:11: Bye Bye [preauth] Jan 9 05:52:41 host sshd[17898]: Disconnected from 20.119.249.229 port 1024 [preauth] Jan 9 05:53:02 host sshd[17972]: Invalid user shalini from 206.189.42.174 port 49330 Jan 9 05:53:02 host sshd[17972]: input_userauth_request: invalid user shalini [preauth] Jan 9 05:53:02 host sshd[17972]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:53:02 host sshd[17972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.42.174 Jan 9 05:53:04 host sshd[17972]: Failed password for invalid user shalini from 206.189.42.174 port 49330 ssh2 Jan 9 05:53:04 host sshd[17972]: Received disconnect from 206.189.42.174 port 49330:11: Bye Bye [preauth] Jan 9 05:53:04 host sshd[17972]: Disconnected from 206.189.42.174 port 49330 [preauth] Jan 9 05:53:41 host sshd[18078]: Invalid user sergio from 222.252.11.10 port 41833 Jan 9 05:53:41 host sshd[18078]: input_userauth_request: invalid user sergio [preauth] Jan 9 05:53:41 host sshd[18078]: pam_unix(sshd:auth): check pass; user unknown Jan 9 05:53:41 host sshd[18078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.11.10 Jan 9 05:53:43 host sshd[18078]: Failed password for invalid user sergio from 222.252.11.10 port 41833 ssh2 Jan 9 05:53:43 host sshd[18078]: Received disconnect from 222.252.11.10 port 41833:11: Bye Bye [preauth] Jan 9 05:53:43 host sshd[18078]: Disconnected from 222.252.11.10 port 41833 [preauth] Jan 9 06:01:32 host sshd[19210]: Invalid user hadoop from 82.196.5.251 port 37574 Jan 9 06:01:32 host sshd[19210]: input_userauth_request: invalid user hadoop [preauth] Jan 9 06:01:32 host sshd[19210]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:01:32 host sshd[19210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.5.251 Jan 9 06:01:34 host sshd[19210]: Failed password for invalid user hadoop from 82.196.5.251 port 37574 ssh2 Jan 9 06:01:35 host sshd[19210]: Received disconnect from 82.196.5.251 port 37574:11: Bye Bye [preauth] Jan 9 06:01:35 host sshd[19210]: Disconnected from 82.196.5.251 port 37574 [preauth] Jan 9 06:01:38 host sshd[19224]: Invalid user alyssa from 147.182.171.152 port 49852 Jan 9 06:01:38 host sshd[19224]: input_userauth_request: invalid user alyssa [preauth] Jan 9 06:01:38 host sshd[19224]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:01:38 host sshd[19224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.171.152 Jan 9 06:01:40 host sshd[19224]: Failed password for invalid user alyssa from 147.182.171.152 port 49852 ssh2 Jan 9 06:01:41 host sshd[19224]: Received disconnect from 147.182.171.152 port 49852:11: Bye Bye [preauth] Jan 9 06:01:41 host sshd[19224]: Disconnected from 147.182.171.152 port 49852 [preauth] Jan 9 06:02:15 host sshd[19277]: Invalid user bm from 194.110.203.109 port 49940 Jan 9 06:02:15 host sshd[19277]: input_userauth_request: invalid user bm [preauth] Jan 9 06:02:15 host sshd[19277]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:02:15 host sshd[19277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 06:02:18 host sshd[19277]: Failed password for invalid user bm from 194.110.203.109 port 49940 ssh2 Jan 9 06:02:20 host sshd[19288]: Invalid user hadoop from 159.65.154.184 port 33748 Jan 9 06:02:20 host sshd[19288]: input_userauth_request: invalid user hadoop [preauth] Jan 9 06:02:20 host sshd[19288]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:02:20 host sshd[19288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.154.184 Jan 9 06:02:21 host sshd[19277]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:02:21 host sshd[19288]: Failed password for invalid user hadoop from 159.65.154.184 port 33748 ssh2 Jan 9 06:02:21 host sshd[19288]: Received disconnect from 159.65.154.184 port 33748:11: Bye Bye [preauth] Jan 9 06:02:21 host sshd[19288]: Disconnected from 159.65.154.184 port 33748 [preauth] Jan 9 06:02:23 host sshd[19277]: Failed password for invalid user bm from 194.110.203.109 port 49940 ssh2 Jan 9 06:02:26 host sshd[19277]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:02:28 host sshd[19277]: Failed password for invalid user bm from 194.110.203.109 port 49940 ssh2 Jan 9 06:02:28 host sshd[19298]: Invalid user jun from 101.141.164.116 port 47094 Jan 9 06:02:28 host sshd[19298]: input_userauth_request: invalid user jun [preauth] Jan 9 06:02:28 host sshd[19298]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:02:28 host sshd[19298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.141.164.116 Jan 9 06:02:30 host sshd[19298]: Failed password for invalid user jun from 101.141.164.116 port 47094 ssh2 Jan 9 06:02:30 host sshd[19298]: Received disconnect from 101.141.164.116 port 47094:11: Bye Bye [preauth] Jan 9 06:02:30 host sshd[19298]: Disconnected from 101.141.164.116 port 47094 [preauth] Jan 9 06:02:31 host sshd[19277]: Connection closed by 194.110.203.109 port 49940 [preauth] Jan 9 06:02:31 host sshd[19277]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 06:02:57 host sshd[19360]: Invalid user juan from 139.59.80.61 port 33414 Jan 9 06:02:57 host sshd[19360]: input_userauth_request: invalid user juan [preauth] Jan 9 06:02:57 host sshd[19360]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:02:57 host sshd[19360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.61 Jan 9 06:02:59 host sshd[19360]: Failed password for invalid user juan from 139.59.80.61 port 33414 ssh2 Jan 9 06:02:59 host sshd[19360]: Received disconnect from 139.59.80.61 port 33414:11: Bye Bye [preauth] Jan 9 06:02:59 host sshd[19360]: Disconnected from 139.59.80.61 port 33414 [preauth] Jan 9 06:04:39 host sshd[19552]: Invalid user lucia from 147.182.171.152 port 33996 Jan 9 06:04:39 host sshd[19552]: input_userauth_request: invalid user lucia [preauth] Jan 9 06:04:39 host sshd[19552]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:04:39 host sshd[19552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.171.152 Jan 9 06:04:41 host sshd[19552]: Failed password for invalid user lucia from 147.182.171.152 port 33996 ssh2 Jan 9 06:04:41 host sshd[19552]: Received disconnect from 147.182.171.152 port 33996:11: Bye Bye [preauth] Jan 9 06:04:41 host sshd[19552]: Disconnected from 147.182.171.152 port 33996 [preauth] Jan 9 06:05:33 host sshd[19784]: Invalid user git from 101.141.164.116 port 35602 Jan 9 06:05:33 host sshd[19784]: input_userauth_request: invalid user git [preauth] Jan 9 06:05:33 host sshd[19784]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:05:33 host sshd[19784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.141.164.116 Jan 9 06:05:35 host sshd[19787]: Invalid user brainy from 82.196.5.251 port 59301 Jan 9 06:05:35 host sshd[19787]: input_userauth_request: invalid user brainy [preauth] Jan 9 06:05:35 host sshd[19787]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:05:35 host sshd[19787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.5.251 Jan 9 06:05:35 host sshd[19784]: Failed password for invalid user git from 101.141.164.116 port 35602 ssh2 Jan 9 06:05:35 host sshd[19784]: Received disconnect from 101.141.164.116 port 35602:11: Bye Bye [preauth] Jan 9 06:05:35 host sshd[19784]: Disconnected from 101.141.164.116 port 35602 [preauth] Jan 9 06:05:37 host sshd[19787]: Failed password for invalid user brainy from 82.196.5.251 port 59301 ssh2 Jan 9 06:05:37 host sshd[19787]: Received disconnect from 82.196.5.251 port 59301:11: Bye Bye [preauth] Jan 9 06:05:37 host sshd[19787]: Disconnected from 82.196.5.251 port 59301 [preauth] Jan 9 06:05:47 host sshd[19802]: Invalid user roland from 147.182.171.152 port 33454 Jan 9 06:05:47 host sshd[19802]: input_userauth_request: invalid user roland [preauth] Jan 9 06:05:47 host sshd[19802]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:05:47 host sshd[19802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.171.152 Jan 9 06:05:49 host sshd[19802]: Failed password for invalid user roland from 147.182.171.152 port 33454 ssh2 Jan 9 06:05:49 host sshd[19802]: Received disconnect from 147.182.171.152 port 33454:11: Bye Bye [preauth] Jan 9 06:05:49 host sshd[19802]: Disconnected from 147.182.171.152 port 33454 [preauth] Jan 9 06:06:08 host sshd[19885]: Invalid user admin from 139.59.80.61 port 40704 Jan 9 06:06:08 host sshd[19885]: input_userauth_request: invalid user admin [preauth] Jan 9 06:06:08 host sshd[19885]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:06:08 host sshd[19885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.61 Jan 9 06:06:10 host sshd[19885]: Failed password for invalid user admin from 139.59.80.61 port 40704 ssh2 Jan 9 06:06:10 host sshd[19885]: Received disconnect from 139.59.80.61 port 40704:11: Bye Bye [preauth] Jan 9 06:06:10 host sshd[19885]: Disconnected from 139.59.80.61 port 40704 [preauth] Jan 9 06:06:16 host sshd[19894]: Invalid user www from 159.65.154.184 port 44902 Jan 9 06:06:16 host sshd[19894]: input_userauth_request: invalid user www [preauth] Jan 9 06:06:16 host sshd[19894]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:06:16 host sshd[19894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.154.184 Jan 9 06:06:18 host sshd[19894]: Failed password for invalid user www from 159.65.154.184 port 44902 ssh2 Jan 9 06:06:18 host sshd[19894]: Received disconnect from 159.65.154.184 port 44902:11: Bye Bye [preauth] Jan 9 06:06:18 host sshd[19894]: Disconnected from 159.65.154.184 port 44902 [preauth] Jan 9 06:06:36 host sshd[19948]: Invalid user gta from 82.196.5.251 port 42542 Jan 9 06:06:36 host sshd[19948]: input_userauth_request: invalid user gta [preauth] Jan 9 06:06:36 host sshd[19948]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:06:36 host sshd[19948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.5.251 Jan 9 06:06:38 host sshd[19948]: Failed password for invalid user gta from 82.196.5.251 port 42542 ssh2 Jan 9 06:06:51 host sshd[20001]: Invalid user jarservice from 101.141.164.116 port 48730 Jan 9 06:06:51 host sshd[20001]: input_userauth_request: invalid user jarservice [preauth] Jan 9 06:06:51 host sshd[20001]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:06:51 host sshd[20001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.141.164.116 Jan 9 06:06:53 host sshd[20001]: Failed password for invalid user jarservice from 101.141.164.116 port 48730 ssh2 Jan 9 06:07:27 host sshd[20093]: Invalid user nano from 139.59.80.61 port 35662 Jan 9 06:07:27 host sshd[20093]: input_userauth_request: invalid user nano [preauth] Jan 9 06:07:27 host sshd[20093]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:07:27 host sshd[20093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.61 Jan 9 06:07:29 host sshd[20093]: Failed password for invalid user nano from 139.59.80.61 port 35662 ssh2 Jan 9 06:07:29 host sshd[20093]: Received disconnect from 139.59.80.61 port 35662:11: Bye Bye [preauth] Jan 9 06:07:29 host sshd[20093]: Disconnected from 139.59.80.61 port 35662 [preauth] Jan 9 06:07:29 host sshd[20118]: Invalid user ops from 159.65.154.184 port 38628 Jan 9 06:07:29 host sshd[20118]: input_userauth_request: invalid user ops [preauth] Jan 9 06:07:29 host sshd[20118]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:07:29 host sshd[20118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.154.184 Jan 9 06:07:31 host sshd[20118]: Failed password for invalid user ops from 159.65.154.184 port 38628 ssh2 Jan 9 06:07:31 host sshd[20118]: Received disconnect from 159.65.154.184 port 38628:11: Bye Bye [preauth] Jan 9 06:07:31 host sshd[20118]: Disconnected from 159.65.154.184 port 38628 [preauth] Jan 9 06:11:37 host sshd[20757]: Connection closed by 192.241.226.6 port 38694 [preauth] Jan 9 06:15:23 host sshd[21263]: Connection closed by 172.105.128.13 port 26500 [preauth] Jan 9 06:15:24 host sshd[21267]: Did not receive identification string from 172.105.128.13 port 26506 Jan 9 06:15:28 host sshd[21269]: Connection closed by 172.105.128.13 port 26514 [preauth] Jan 9 06:16:59 host sshd[21439]: Invalid user wayne from 107.189.30.59 port 37184 Jan 9 06:16:59 host sshd[21439]: input_userauth_request: invalid user wayne [preauth] Jan 9 06:16:59 host sshd[21439]: pam_unix(sshd:auth): check pass; user unknown Jan 9 06:16:59 host sshd[21439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 9 06:17:02 host sshd[21439]: Failed password for invalid user wayne from 107.189.30.59 port 37184 ssh2 Jan 9 06:17:03 host sshd[21439]: Connection closed by 107.189.30.59 port 37184 [preauth] Jan 9 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwresourcehunte user-3=keralaholi user-4=wwwrmswll user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=wwwnexidigital user-17=mrsclean user-18=palco123 user-19=gifterman user-20=phmetals user-21=kottayamcalldriv user-22=wwwkapin user-23=woodpeck user-24=disposeat user-25=remysagr user-26=wwwkmaorg user-27=pmcresources user-28=vfmassets user-29=shalinijames user-30=wwwtestugo feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 06:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Q2H09ZZfIyiQp3sS.~ Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Q2H09ZZfIyiQp3sS.~' Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Q2H09ZZfIyiQp3sS.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 06:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 06:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 06:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 06:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 06:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 06:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 06:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 06:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 06:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 06:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 06:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 06:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 06:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 06:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 06:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 06:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 06:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 06:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 06:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 06:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 06:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 06:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 06:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 06:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 06:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 06:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 06:41:11 host sshd[25261]: ssh_dispatch_run_fatal: Connection from 207.229.167.36 port 34512: Connection corrupted [preauth] Jan 9 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=ugotscom user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=mrsclean user-17=wwwnexidigital user-18=wwwevmhonda user-19=bonifacegroup user-20=straightcurve user-21=wwwletsstalkfood user-22=shalinijames user-23=wwwtestugo user-24=vfmassets user-25=pmcresources user-26=remysagr user-27=disposeat user-28=wwwkmaorg user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 07:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zXOJRSUDlgHefank.~ Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zXOJRSUDlgHefank.~' Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zXOJRSUDlgHefank.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 07:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 07:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 07:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 07:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 07:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 07:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 07:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 07:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 07:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 07:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 07:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 07:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 07:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 07:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 07:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 07:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 07:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 07:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 07:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 07:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 07:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 07:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 07:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 07:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 07:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 07:33:40 host sshd[438]: Invalid user appltest from 157.245.157.93 port 34140 Jan 9 07:33:40 host sshd[438]: input_userauth_request: invalid user appltest [preauth] Jan 9 07:33:40 host sshd[438]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:33:40 host sshd[438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.157.93 Jan 9 07:33:43 host sshd[438]: Failed password for invalid user appltest from 157.245.157.93 port 34140 ssh2 Jan 9 07:33:43 host sshd[438]: Received disconnect from 157.245.157.93 port 34140:11: Bye Bye [preauth] Jan 9 07:33:43 host sshd[438]: Disconnected from 157.245.157.93 port 34140 [preauth] Jan 9 07:37:28 host sshd[923]: Invalid user user4 from 43.131.36.157 port 47302 Jan 9 07:37:28 host sshd[923]: input_userauth_request: invalid user user4 [preauth] Jan 9 07:37:28 host sshd[923]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:37:28 host sshd[923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.36.157 Jan 9 07:37:30 host sshd[923]: Failed password for invalid user user4 from 43.131.36.157 port 47302 ssh2 Jan 9 07:37:30 host sshd[923]: Received disconnect from 43.131.36.157 port 47302:11: Bye Bye [preauth] Jan 9 07:37:30 host sshd[923]: Disconnected from 43.131.36.157 port 47302 [preauth] Jan 9 07:38:15 host sshd[1122]: Invalid user super from 202.137.130.61 port 55016 Jan 9 07:38:15 host sshd[1122]: input_userauth_request: invalid user super [preauth] Jan 9 07:38:15 host sshd[1122]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:38:15 host sshd[1122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.130.61 Jan 9 07:38:17 host sshd[1122]: Failed password for invalid user super from 202.137.130.61 port 55016 ssh2 Jan 9 07:38:17 host sshd[1122]: Received disconnect from 202.137.130.61 port 55016:11: Bye Bye [preauth] Jan 9 07:38:17 host sshd[1122]: Disconnected from 202.137.130.61 port 55016 [preauth] Jan 9 07:38:28 host sshd[1142]: Did not receive identification string from 185.38.111.110 port 49677 Jan 9 07:39:35 host sshd[1304]: Invalid user user from 157.245.157.93 port 34782 Jan 9 07:39:35 host sshd[1304]: input_userauth_request: invalid user user [preauth] Jan 9 07:39:35 host sshd[1304]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:39:35 host sshd[1304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.157.93 Jan 9 07:39:37 host sshd[1304]: Failed password for invalid user user from 157.245.157.93 port 34782 ssh2 Jan 9 07:39:37 host sshd[1304]: Received disconnect from 157.245.157.93 port 34782:11: Bye Bye [preauth] Jan 9 07:39:37 host sshd[1304]: Disconnected from 157.245.157.93 port 34782 [preauth] Jan 9 07:40:28 host sshd[1405]: Invalid user rustserver from 43.131.36.157 port 39540 Jan 9 07:40:28 host sshd[1405]: input_userauth_request: invalid user rustserver [preauth] Jan 9 07:40:28 host sshd[1405]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:40:28 host sshd[1405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.36.157 Jan 9 07:40:31 host sshd[1405]: Failed password for invalid user rustserver from 43.131.36.157 port 39540 ssh2 Jan 9 07:40:31 host sshd[1405]: Received disconnect from 43.131.36.157 port 39540:11: Bye Bye [preauth] Jan 9 07:40:31 host sshd[1405]: Disconnected from 43.131.36.157 port 39540 [preauth] Jan 9 07:40:59 host sshd[1479]: User tomcat from 202.137.130.61 not allowed because not listed in AllowUsers Jan 9 07:40:59 host sshd[1479]: input_userauth_request: invalid user tomcat [preauth] Jan 9 07:40:59 host unix_chkpwd[1481]: password check failed for user (tomcat) Jan 9 07:40:59 host sshd[1479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.130.61 user=tomcat Jan 9 07:40:59 host sshd[1479]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Jan 9 07:41:01 host sshd[1479]: Failed password for invalid user tomcat from 202.137.130.61 port 58978 ssh2 Jan 9 07:41:01 host sshd[1479]: Received disconnect from 202.137.130.61 port 58978:11: Bye Bye [preauth] Jan 9 07:41:01 host sshd[1479]: Disconnected from 202.137.130.61 port 58978 [preauth] Jan 9 07:41:07 host sshd[1530]: Invalid user qadmin from 157.245.157.93 port 33948 Jan 9 07:41:07 host sshd[1530]: input_userauth_request: invalid user qadmin [preauth] Jan 9 07:41:07 host sshd[1530]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:41:07 host sshd[1530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.157.93 Jan 9 07:41:09 host sshd[1530]: Failed password for invalid user qadmin from 157.245.157.93 port 33948 ssh2 Jan 9 07:41:09 host sshd[1530]: Received disconnect from 157.245.157.93 port 33948:11: Bye Bye [preauth] Jan 9 07:41:09 host sshd[1530]: Disconnected from 157.245.157.93 port 33948 [preauth] Jan 9 07:41:29 host sshd[1621]: Did not receive identification string from 8.219.234.194 port 40474 Jan 9 07:41:32 host sshd[1623]: Invalid user bart from 43.131.36.157 port 47830 Jan 9 07:41:32 host sshd[1623]: input_userauth_request: invalid user bart [preauth] Jan 9 07:41:32 host sshd[1623]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:41:32 host sshd[1623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.36.157 Jan 9 07:41:34 host sshd[1623]: Failed password for invalid user bart from 43.131.36.157 port 47830 ssh2 Jan 9 07:41:34 host sshd[1623]: Received disconnect from 43.131.36.157 port 47830:11: Bye Bye [preauth] Jan 9 07:41:34 host sshd[1623]: Disconnected from 43.131.36.157 port 47830 [preauth] Jan 9 07:42:02 host sshd[1696]: Invalid user admin from 8.219.234.194 port 40692 Jan 9 07:42:02 host sshd[1696]: input_userauth_request: invalid user admin [preauth] Jan 9 07:42:02 host sshd[1696]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:42:02 host sshd[1696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.219.234.194 Jan 9 07:42:04 host sshd[1696]: Failed password for invalid user admin from 8.219.234.194 port 40692 ssh2 Jan 9 07:42:04 host sshd[1696]: Connection closed by 8.219.234.194 port 40692 [preauth] Jan 9 07:42:45 host sshd[1799]: Invalid user admin from 8.219.234.194 port 35496 Jan 9 07:42:45 host sshd[1799]: input_userauth_request: invalid user admin [preauth] Jan 9 07:42:45 host sshd[1799]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:42:45 host sshd[1799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.219.234.194 Jan 9 07:42:47 host sshd[1799]: Failed password for invalid user admin from 8.219.234.194 port 35496 ssh2 Jan 9 07:42:47 host sshd[1799]: Connection closed by 8.219.234.194 port 35496 [preauth] Jan 9 07:49:12 host sshd[3094]: Did not receive identification string from 111.2.69.175 port 45523 Jan 9 07:49:14 host sshd[3096]: Invalid user ansadmin from 111.2.69.175 port 46317 Jan 9 07:49:14 host sshd[3096]: input_userauth_request: invalid user ansadmin [preauth] Jan 9 07:49:14 host sshd[3101]: Invalid user testuser from 111.2.69.175 port 46319 Jan 9 07:49:14 host sshd[3101]: input_userauth_request: invalid user testuser [preauth] Jan 9 07:49:14 host sshd[3108]: Invalid user guest from 111.2.69.175 port 46315 Jan 9 07:49:14 host sshd[3108]: input_userauth_request: invalid user guest [preauth] Jan 9 07:49:14 host sshd[3111]: User centos from 111.2.69.175 not allowed because not listed in AllowUsers Jan 9 07:49:14 host sshd[3111]: input_userauth_request: invalid user centos [preauth] Jan 9 07:49:14 host sshd[3096]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:49:14 host sshd[3096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.2.69.175 Jan 9 07:49:14 host sshd[3108]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:49:14 host sshd[3108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.2.69.175 Jan 9 07:49:14 host sshd[3097]: Invalid user guest from 111.2.69.175 port 46307 Jan 9 07:49:14 host sshd[3097]: input_userauth_request: invalid user guest [preauth] Jan 9 07:49:14 host sshd[3100]: Invalid user test from 111.2.69.175 port 46305 Jan 9 07:49:14 host sshd[3100]: input_userauth_request: invalid user test [preauth] Jan 9 07:49:14 host unix_chkpwd[3168]: password check failed for user (centos) Jan 9 07:49:14 host sshd[3111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.2.69.175 user=centos Jan 9 07:49:15 host sshd[3097]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:49:15 host sshd[3097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.2.69.175 Jan 9 07:49:15 host sshd[3100]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:49:15 host sshd[3100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.2.69.175 Jan 9 07:49:15 host sshd[3105]: Invalid user devops from 111.2.69.175 port 46306 Jan 9 07:49:15 host sshd[3105]: input_userauth_request: invalid user devops [preauth] Jan 9 07:49:16 host sshd[3101]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:49:16 host sshd[3101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.2.69.175 Jan 9 07:49:17 host sshd[3097]: Failed password for invalid user guest from 111.2.69.175 port 46307 ssh2 Jan 9 07:49:17 host sshd[3100]: Failed password for invalid user test from 111.2.69.175 port 46305 ssh2 Jan 9 07:49:17 host sshd[3096]: Failed password for invalid user ansadmin from 111.2.69.175 port 46317 ssh2 Jan 9 07:49:17 host sshd[3110]: Invalid user guest from 111.2.69.175 port 46301 Jan 9 07:49:17 host sshd[3110]: input_userauth_request: invalid user guest [preauth] Jan 9 07:49:17 host sshd[3097]: Connection closed by 111.2.69.175 port 46307 [preauth] Jan 9 07:49:17 host sshd[3108]: Failed password for invalid user guest from 111.2.69.175 port 46315 ssh2 Jan 9 07:49:17 host sshd[3096]: Connection closed by 111.2.69.175 port 46317 [preauth] Jan 9 07:49:17 host sshd[3111]: Failed password for invalid user centos from 111.2.69.175 port 46303 ssh2 Jan 9 07:49:17 host sshd[3104]: Invalid user testuser from 111.2.69.175 port 46313 Jan 9 07:49:17 host sshd[3104]: input_userauth_request: invalid user testuser [preauth] Jan 9 07:49:18 host sshd[3100]: Connection closed by 111.2.69.175 port 46305 [preauth] Jan 9 07:49:18 host sshd[3101]: Failed password for invalid user testuser from 111.2.69.175 port 46319 ssh2 Jan 9 07:49:18 host sshd[3110]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:49:18 host sshd[3110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.2.69.175 Jan 9 07:49:18 host sshd[3108]: Connection closed by 111.2.69.175 port 46315 [preauth] Jan 9 07:49:18 host sshd[3105]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:49:18 host sshd[3105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.2.69.175 Jan 9 07:49:19 host sshd[3104]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:49:19 host sshd[3104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.2.69.175 Jan 9 07:49:19 host sshd[3101]: Connection closed by 111.2.69.175 port 46319 [preauth] Jan 9 07:49:19 host sshd[3111]: Connection closed by 111.2.69.175 port 46303 [preauth] Jan 9 07:49:20 host sshd[3110]: Failed password for invalid user guest from 111.2.69.175 port 46301 ssh2 Jan 9 07:49:20 host sshd[3105]: Failed password for invalid user devops from 111.2.69.175 port 46306 ssh2 Jan 9 07:49:21 host sshd[3110]: Connection closed by 111.2.69.175 port 46301 [preauth] Jan 9 07:49:21 host sshd[3105]: Connection closed by 111.2.69.175 port 46306 [preauth] Jan 9 07:49:21 host sshd[3104]: Failed password for invalid user testuser from 111.2.69.175 port 46313 ssh2 Jan 9 07:49:21 host sshd[3104]: Connection closed by 111.2.69.175 port 46313 [preauth] Jan 9 07:59:22 host sshd[4652]: Invalid user .log from 143.244.158.100 port 37190 Jan 9 07:59:22 host sshd[4652]: input_userauth_request: invalid user .log [preauth] Jan 9 07:59:22 host sshd[4652]: pam_unix(sshd:auth): check pass; user unknown Jan 9 07:59:22 host sshd[4652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.158.100 Jan 9 07:59:24 host sshd[4652]: Failed password for invalid user .log from 143.244.158.100 port 37190 ssh2 Jan 9 07:59:25 host sshd[4652]: Received disconnect from 143.244.158.100 port 37190:11: Bye Bye [preauth] Jan 9 07:59:25 host sshd[4652]: Disconnected from 143.244.158.100 port 37190 [preauth] Jan 9 08:00:40 host sshd[4856]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 9 08:00:40 host sshd[4856]: input_userauth_request: invalid user root [preauth] Jan 9 08:00:40 host unix_chkpwd[4859]: password check failed for user (root) Jan 9 08:00:40 host sshd[4856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 9 08:00:40 host sshd[4856]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 08:00:42 host sshd[4856]: Failed password for invalid user root from 209.141.55.27 port 59628 ssh2 Jan 9 08:00:42 host sshd[4856]: Received disconnect from 209.141.55.27 port 59628:11: Normal Shutdown, Thank you for playing [preauth] Jan 9 08:00:42 host sshd[4856]: Disconnected from 209.141.55.27 port 59628 [preauth] Jan 9 08:07:52 host sshd[5814]: Invalid user bn from 194.110.203.109 port 40806 Jan 9 08:07:52 host sshd[5814]: input_userauth_request: invalid user bn [preauth] Jan 9 08:07:52 host sshd[5814]: pam_unix(sshd:auth): check pass; user unknown Jan 9 08:07:52 host sshd[5814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 08:07:53 host sshd[5814]: Failed password for invalid user bn from 194.110.203.109 port 40806 ssh2 Jan 9 08:07:57 host sshd[5814]: pam_unix(sshd:auth): check pass; user unknown Jan 9 08:07:59 host sshd[5814]: Failed password for invalid user bn from 194.110.203.109 port 40806 ssh2 Jan 9 08:08:02 host sshd[5814]: pam_unix(sshd:auth): check pass; user unknown Jan 9 08:08:04 host sshd[5814]: Failed password for invalid user bn from 194.110.203.109 port 40806 ssh2 Jan 9 08:08:07 host sshd[5814]: Connection closed by 194.110.203.109 port 40806 [preauth] Jan 9 08:08:07 host sshd[5814]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 08:18:24 host sshd[7313]: Invalid user prueba from 217.94.216.86 port 44178 Jan 9 08:18:24 host sshd[7313]: input_userauth_request: invalid user prueba [preauth] Jan 9 08:18:24 host sshd[7313]: pam_unix(sshd:auth): check pass; user unknown Jan 9 08:18:24 host sshd[7313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.94.216.86 Jan 9 08:18:26 host sshd[7313]: Failed password for invalid user prueba from 217.94.216.86 port 44178 ssh2 Jan 9 08:18:26 host sshd[7313]: Received disconnect from 217.94.216.86 port 44178:11: Bye Bye [preauth] Jan 9 08:18:26 host sshd[7313]: Disconnected from 217.94.216.86 port 44178 [preauth] Jan 9 08:18:52 host sshd[7390]: Bad protocol version identification 'GET / HTTP/1.1' from 64.227.188.170 port 50688 Jan 9 08:18:59 host sshd[7401]: Invalid user postgres from 164.92.86.206 port 49306 Jan 9 08:18:59 host sshd[7401]: input_userauth_request: invalid user postgres [preauth] Jan 9 08:18:59 host sshd[7401]: pam_unix(sshd:auth): check pass; user unknown Jan 9 08:18:59 host sshd[7401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.86.206 Jan 9 08:19:00 host sshd[7401]: Failed password for invalid user postgres from 164.92.86.206 port 49306 ssh2 Jan 9 08:19:01 host sshd[7401]: Received disconnect from 164.92.86.206 port 49306:11: Bye Bye [preauth] Jan 9 08:19:01 host sshd[7401]: Disconnected from 164.92.86.206 port 49306 [preauth] Jan 9 08:19:34 host sshd[7445]: Connection closed by 64.227.188.170 port 51724 [preauth] Jan 9 08:20:54 host sshd[7718]: Invalid user rustserver from 217.94.216.86 port 43971 Jan 9 08:20:54 host sshd[7718]: input_userauth_request: invalid user rustserver [preauth] Jan 9 08:20:54 host sshd[7718]: pam_unix(sshd:auth): check pass; user unknown Jan 9 08:20:54 host sshd[7718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.94.216.86 Jan 9 08:20:56 host sshd[7718]: Failed password for invalid user rustserver from 217.94.216.86 port 43971 ssh2 Jan 9 08:20:56 host sshd[7718]: Received disconnect from 217.94.216.86 port 43971:11: Bye Bye [preauth] Jan 9 08:20:56 host sshd[7718]: Disconnected from 217.94.216.86 port 43971 [preauth] Jan 9 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=wwwtestugo user-3=shalinijames user-4=vfmassets user-5=woodpeck user-6=wwwkapin user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=kottayamcalldriv user-13=phmetals user-14=gifterman user-15=palco123 user-16=straightcurve user-17=wwwletsstalkfood user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=wwwkaretakers user-24=cochintaxi user-25=ugotscom user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 08:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7EU4v3hktDShSZ77.~ Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7EU4v3hktDShSZ77.~' Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7EU4v3hktDShSZ77.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 08:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 08:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 08:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 08:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 08:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 08:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 08:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 08:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 08:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 08:22:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 08:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 08:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 08:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 08:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 08:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 08:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 08:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 08:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 08:22:12 host sshd[8045]: Invalid user vnc from 217.94.216.86 port 56735 Jan 9 08:22:12 host sshd[8045]: input_userauth_request: invalid user vnc [preauth] Jan 9 08:22:12 host sshd[8045]: pam_unix(sshd:auth): check pass; user unknown Jan 9 08:22:12 host sshd[8045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.94.216.86 Jan 9 08:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 08:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 08:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 08:22:14 host sshd[8045]: Failed password for invalid user vnc from 217.94.216.86 port 56735 ssh2 Jan 9 08:22:14 host sshd[8045]: Received disconnect from 217.94.216.86 port 56735:11: Bye Bye [preauth] Jan 9 08:22:14 host sshd[8045]: Disconnected from 217.94.216.86 port 56735 [preauth] Jan 9 08:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 08:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 08:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 08:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 08:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 08:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 08:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 08:23:16 host sshd[8341]: Invalid user fedena from 164.92.86.206 port 58526 Jan 9 08:23:16 host sshd[8341]: input_userauth_request: invalid user fedena [preauth] Jan 9 08:23:16 host sshd[8341]: pam_unix(sshd:auth): check pass; user unknown Jan 9 08:23:16 host sshd[8341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.86.206 Jan 9 08:23:18 host sshd[8341]: Failed password for invalid user fedena from 164.92.86.206 port 58526 ssh2 Jan 9 08:23:18 host sshd[8341]: Received disconnect from 164.92.86.206 port 58526:11: Bye Bye [preauth] Jan 9 08:23:18 host sshd[8341]: Disconnected from 164.92.86.206 port 58526 [preauth] Jan 9 08:24:39 host sshd[8528]: Invalid user alexandra from 164.92.86.206 port 58928 Jan 9 08:24:39 host sshd[8528]: input_userauth_request: invalid user alexandra [preauth] Jan 9 08:24:39 host sshd[8528]: pam_unix(sshd:auth): check pass; user unknown Jan 9 08:24:39 host sshd[8528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.86.206 Jan 9 08:24:40 host sshd[8528]: Failed password for invalid user alexandra from 164.92.86.206 port 58928 ssh2 Jan 9 08:24:41 host sshd[8528]: Received disconnect from 164.92.86.206 port 58928:11: Bye Bye [preauth] Jan 9 08:24:41 host sshd[8528]: Disconnected from 164.92.86.206 port 58928 [preauth] Jan 9 08:40:48 host sshd[11035]: Invalid user from 64.62.197.108 port 62779 Jan 9 08:40:48 host sshd[11035]: input_userauth_request: invalid user [preauth] Jan 9 08:40:51 host sshd[11035]: Connection closed by 64.62.197.108 port 62779 [preauth] Jan 9 09:12:33 host sshd[16699]: Connection closed by 67.207.95.230 port 57338 [preauth] Jan 9 09:12:50 host sshd[16775]: User root from 80.94.92.241 not allowed because not listed in AllowUsers Jan 9 09:12:50 host sshd[16775]: input_userauth_request: invalid user root [preauth] Jan 9 09:12:50 host sshd[16776]: User root from 80.94.92.241 not allowed because not listed in AllowUsers Jan 9 09:12:50 host sshd[16776]: input_userauth_request: invalid user root [preauth] Jan 9 09:12:50 host unix_chkpwd[16780]: password check failed for user (root) Jan 9 09:12:50 host sshd[16775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241 user=root Jan 9 09:12:50 host sshd[16775]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 09:12:50 host unix_chkpwd[16781]: password check failed for user (root) Jan 9 09:12:50 host sshd[16776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.92.241 user=root Jan 9 09:12:50 host sshd[16776]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 09:12:53 host sshd[16775]: Failed password for invalid user root from 80.94.92.241 port 46630 ssh2 Jan 9 09:12:53 host sshd[16776]: Failed password for invalid user root from 80.94.92.241 port 46634 ssh2 Jan 9 09:12:53 host sshd[16775]: Connection closed by 80.94.92.241 port 46630 [preauth] Jan 9 09:12:53 host sshd[16776]: Connection closed by 80.94.92.241 port 46634 [preauth] Jan 9 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=phmetals user-8=kottayamcalldriv user-9=gifterman user-10=palco123 user-11=woodpeck user-12=wwwkapin user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 09:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HGSlsxsojWchncla.~ Jan 9 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HGSlsxsojWchncla.~' Jan 9 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HGSlsxsojWchncla.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 09:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 09:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 09:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 09:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 09:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 09:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 09:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 09:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 09:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 09:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 09:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 09:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 09:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 09:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 09:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 09:22:10 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 09:22:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 09:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 09:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 09:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 09:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 09:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 09:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 09:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 09:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 09:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 09:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 09:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 09:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 09:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 09:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 09:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 09:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 09:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 09:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 09:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 09:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 09:22:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 09:22:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 09:32:01 host sshd[20543]: Invalid user paulo from 103.206.223.178 port 34388 Jan 9 09:32:01 host sshd[20543]: input_userauth_request: invalid user paulo [preauth] Jan 9 09:32:01 host sshd[20543]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:32:01 host sshd[20543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.206.223.178 Jan 9 09:32:03 host sshd[20543]: Failed password for invalid user paulo from 103.206.223.178 port 34388 ssh2 Jan 9 09:32:03 host sshd[20543]: Received disconnect from 103.206.223.178 port 34388:11: Bye Bye [preauth] Jan 9 09:32:03 host sshd[20543]: Disconnected from 103.206.223.178 port 34388 [preauth] Jan 9 09:32:15 host sshd[20585]: Invalid user noc from 45.118.160.155 port 45554 Jan 9 09:32:15 host sshd[20585]: input_userauth_request: invalid user noc [preauth] Jan 9 09:32:15 host sshd[20585]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:32:15 host sshd[20585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.118.160.155 Jan 9 09:32:18 host sshd[20585]: Failed password for invalid user noc from 45.118.160.155 port 45554 ssh2 Jan 9 09:32:18 host sshd[20585]: Received disconnect from 45.118.160.155 port 45554:11: Bye Bye [preauth] Jan 9 09:32:18 host sshd[20585]: Disconnected from 45.118.160.155 port 45554 [preauth] Jan 9 09:32:56 host sshd[20813]: Invalid user user1 from 159.65.27.32 port 41420 Jan 9 09:32:56 host sshd[20813]: input_userauth_request: invalid user user1 [preauth] Jan 9 09:32:56 host sshd[20813]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:32:56 host sshd[20813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.27.32 Jan 9 09:32:58 host sshd[20813]: Failed password for invalid user user1 from 159.65.27.32 port 41420 ssh2 Jan 9 09:32:59 host sshd[20813]: Received disconnect from 159.65.27.32 port 41420:11: Bye Bye [preauth] Jan 9 09:32:59 host sshd[20813]: Disconnected from 159.65.27.32 port 41420 [preauth] Jan 9 09:33:38 host sshd[20957]: Did not receive identification string from 149.129.220.222 port 61000 Jan 9 09:34:19 host sshd[21056]: Invalid user murali from 64.227.172.225 port 49396 Jan 9 09:34:19 host sshd[21056]: input_userauth_request: invalid user murali [preauth] Jan 9 09:34:19 host sshd[21056]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:34:19 host sshd[21056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.172.225 Jan 9 09:34:20 host sshd[21056]: Failed password for invalid user murali from 64.227.172.225 port 49396 ssh2 Jan 9 09:34:20 host sshd[21056]: Received disconnect from 64.227.172.225 port 49396:11: Bye Bye [preauth] Jan 9 09:34:20 host sshd[21056]: Disconnected from 64.227.172.225 port 49396 [preauth] Jan 9 09:34:50 host sshd[21161]: Invalid user tempo from 24.199.104.139 port 33166 Jan 9 09:34:50 host sshd[21161]: input_userauth_request: invalid user tempo [preauth] Jan 9 09:34:50 host sshd[21161]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:34:50 host sshd[21161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.139 Jan 9 09:34:52 host sshd[21161]: Failed password for invalid user tempo from 24.199.104.139 port 33166 ssh2 Jan 9 09:34:52 host sshd[21161]: Received disconnect from 24.199.104.139 port 33166:11: Bye Bye [preauth] Jan 9 09:34:52 host sshd[21161]: Disconnected from 24.199.104.139 port 33166 [preauth] Jan 9 09:35:22 host sshd[21243]: Invalid user csgoserver from 178.128.148.229 port 46700 Jan 9 09:35:22 host sshd[21243]: input_userauth_request: invalid user csgoserver [preauth] Jan 9 09:35:22 host sshd[21243]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:35:22 host sshd[21243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.148.229 Jan 9 09:35:24 host sshd[21243]: Failed password for invalid user csgoserver from 178.128.148.229 port 46700 ssh2 Jan 9 09:35:24 host sshd[21243]: Received disconnect from 178.128.148.229 port 46700:11: Bye Bye [preauth] Jan 9 09:35:24 host sshd[21243]: Disconnected from 178.128.148.229 port 46700 [preauth] Jan 9 09:35:42 host sshd[21316]: Invalid user student from 181.191.9.163 port 33714 Jan 9 09:35:42 host sshd[21316]: input_userauth_request: invalid user student [preauth] Jan 9 09:35:42 host sshd[21316]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:35:42 host sshd[21316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.9.163 Jan 9 09:35:44 host sshd[21316]: Failed password for invalid user student from 181.191.9.163 port 33714 ssh2 Jan 9 09:35:44 host sshd[21316]: Received disconnect from 181.191.9.163 port 33714:11: Bye Bye [preauth] Jan 9 09:35:44 host sshd[21316]: Disconnected from 181.191.9.163 port 33714 [preauth] Jan 9 09:37:15 host sshd[21517]: Invalid user zk from 134.122.66.121 port 40308 Jan 9 09:37:15 host sshd[21517]: input_userauth_request: invalid user zk [preauth] Jan 9 09:37:15 host sshd[21517]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:37:15 host sshd[21517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.66.121 Jan 9 09:37:17 host sshd[21517]: Failed password for invalid user zk from 134.122.66.121 port 40308 ssh2 Jan 9 09:37:18 host sshd[21517]: Received disconnect from 134.122.66.121 port 40308:11: Bye Bye [preauth] Jan 9 09:37:18 host sshd[21517]: Disconnected from 134.122.66.121 port 40308 [preauth] Jan 9 09:37:58 host sshd[21603]: Invalid user user1 from 45.118.160.155 port 59706 Jan 9 09:37:58 host sshd[21603]: input_userauth_request: invalid user user1 [preauth] Jan 9 09:37:58 host sshd[21603]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:37:58 host sshd[21603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.118.160.155 Jan 9 09:38:00 host sshd[21603]: Failed password for invalid user user1 from 45.118.160.155 port 59706 ssh2 Jan 9 09:38:00 host sshd[21603]: Received disconnect from 45.118.160.155 port 59706:11: Bye Bye [preauth] Jan 9 09:38:00 host sshd[21603]: Disconnected from 45.118.160.155 port 59706 [preauth] Jan 9 09:38:06 host sshd[21693]: Invalid user database from 159.65.27.32 port 32840 Jan 9 09:38:06 host sshd[21693]: input_userauth_request: invalid user database [preauth] Jan 9 09:38:06 host sshd[21693]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:38:06 host sshd[21693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.27.32 Jan 9 09:38:08 host sshd[21693]: Failed password for invalid user database from 159.65.27.32 port 32840 ssh2 Jan 9 09:38:09 host sshd[21693]: Received disconnect from 159.65.27.32 port 32840:11: Bye Bye [preauth] Jan 9 09:38:09 host sshd[21693]: Disconnected from 159.65.27.32 port 32840 [preauth] Jan 9 09:38:19 host sshd[21762]: Invalid user test from 178.128.148.229 port 56496 Jan 9 09:38:19 host sshd[21762]: input_userauth_request: invalid user test [preauth] Jan 9 09:38:19 host sshd[21762]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:38:19 host sshd[21762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.148.229 Jan 9 09:38:21 host sshd[21762]: Failed password for invalid user test from 178.128.148.229 port 56496 ssh2 Jan 9 09:38:22 host sshd[21762]: Received disconnect from 178.128.148.229 port 56496:11: Bye Bye [preauth] Jan 9 09:38:22 host sshd[21762]: Disconnected from 178.128.148.229 port 56496 [preauth] Jan 9 09:38:42 host sshd[21841]: Invalid user josh from 24.199.104.139 port 34974 Jan 9 09:38:42 host sshd[21841]: input_userauth_request: invalid user josh [preauth] Jan 9 09:38:42 host sshd[21841]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:38:42 host sshd[21841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.139 Jan 9 09:38:44 host sshd[21845]: Invalid user gpadmin from 134.122.66.121 port 37670 Jan 9 09:38:44 host sshd[21845]: input_userauth_request: invalid user gpadmin [preauth] Jan 9 09:38:44 host sshd[21845]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:38:44 host sshd[21845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.66.121 Jan 9 09:38:45 host sshd[21841]: Failed password for invalid user josh from 24.199.104.139 port 34974 ssh2 Jan 9 09:38:45 host sshd[21841]: Received disconnect from 24.199.104.139 port 34974:11: Bye Bye [preauth] Jan 9 09:38:45 host sshd[21841]: Disconnected from 24.199.104.139 port 34974 [preauth] Jan 9 09:38:46 host sshd[21845]: Failed password for invalid user gpadmin from 134.122.66.121 port 37670 ssh2 Jan 9 09:38:46 host sshd[21845]: Received disconnect from 134.122.66.121 port 37670:11: Bye Bye [preauth] Jan 9 09:38:46 host sshd[21845]: Disconnected from 134.122.66.121 port 37670 [preauth] Jan 9 09:38:49 host sshd[21860]: Invalid user git from 64.227.172.225 port 36770 Jan 9 09:38:49 host sshd[21860]: input_userauth_request: invalid user git [preauth] Jan 9 09:38:49 host sshd[21860]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:38:49 host sshd[21860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.172.225 Jan 9 09:38:51 host sshd[21860]: Failed password for invalid user git from 64.227.172.225 port 36770 ssh2 Jan 9 09:38:51 host sshd[21860]: Received disconnect from 64.227.172.225 port 36770:11: Bye Bye [preauth] Jan 9 09:38:51 host sshd[21860]: Disconnected from 64.227.172.225 port 36770 [preauth] Jan 9 09:39:16 host sshd[21918]: Invalid user noc from 159.65.27.32 port 37178 Jan 9 09:39:16 host sshd[21918]: input_userauth_request: invalid user noc [preauth] Jan 9 09:39:16 host sshd[21918]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:39:16 host sshd[21918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.27.32 Jan 9 09:39:18 host sshd[21918]: Failed password for invalid user noc from 159.65.27.32 port 37178 ssh2 Jan 9 09:39:18 host sshd[21918]: Received disconnect from 159.65.27.32 port 37178:11: Bye Bye [preauth] Jan 9 09:39:18 host sshd[21918]: Disconnected from 159.65.27.32 port 37178 [preauth] Jan 9 09:39:34 host sshd[22009]: Invalid user paulo from 178.128.148.229 port 55848 Jan 9 09:39:34 host sshd[22009]: input_userauth_request: invalid user paulo [preauth] Jan 9 09:39:34 host sshd[22009]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:39:34 host sshd[22009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.148.229 Jan 9 09:39:36 host sshd[22009]: Failed password for invalid user paulo from 178.128.148.229 port 55848 ssh2 Jan 9 09:39:49 host sshd[22058]: Invalid user josh from 134.122.66.121 port 60784 Jan 9 09:39:49 host sshd[22058]: input_userauth_request: invalid user josh [preauth] Jan 9 09:39:49 host sshd[22058]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:39:49 host sshd[22058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.66.121 Jan 9 09:39:49 host sshd[22056]: Invalid user flask from 181.191.9.163 port 47742 Jan 9 09:39:49 host sshd[22056]: input_userauth_request: invalid user flask [preauth] Jan 9 09:39:49 host sshd[22056]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:39:49 host sshd[22056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.9.163 Jan 9 09:39:51 host sshd[22066]: Invalid user noc from 24.199.104.139 port 34456 Jan 9 09:39:51 host sshd[22066]: input_userauth_request: invalid user noc [preauth] Jan 9 09:39:51 host sshd[22066]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:39:51 host sshd[22066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.139 Jan 9 09:39:52 host sshd[22058]: Failed password for invalid user josh from 134.122.66.121 port 60784 ssh2 Jan 9 09:39:52 host sshd[22056]: Failed password for invalid user flask from 181.191.9.163 port 47742 ssh2 Jan 9 09:39:52 host sshd[22056]: Received disconnect from 181.191.9.163 port 47742:11: Bye Bye [preauth] Jan 9 09:39:52 host sshd[22056]: Disconnected from 181.191.9.163 port 47742 [preauth] Jan 9 09:39:52 host sshd[22066]: Failed password for invalid user noc from 24.199.104.139 port 34456 ssh2 Jan 9 09:39:53 host sshd[22066]: Received disconnect from 24.199.104.139 port 34456:11: Bye Bye [preauth] Jan 9 09:39:53 host sshd[22066]: Disconnected from 24.199.104.139 port 34456 [preauth] Jan 9 09:40:06 host sshd[22180]: Invalid user tempo from 45.118.160.155 port 58682 Jan 9 09:40:06 host sshd[22180]: input_userauth_request: invalid user tempo [preauth] Jan 9 09:40:06 host sshd[22180]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:40:06 host sshd[22180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.118.160.155 Jan 9 09:40:08 host sshd[22180]: Failed password for invalid user tempo from 45.118.160.155 port 58682 ssh2 Jan 9 09:40:08 host sshd[22180]: Received disconnect from 45.118.160.155 port 58682:11: Bye Bye [preauth] Jan 9 09:40:08 host sshd[22180]: Disconnected from 45.118.160.155 port 58682 [preauth] Jan 9 09:40:10 host sshd[22212]: Invalid user es from 64.227.172.225 port 59936 Jan 9 09:40:10 host sshd[22212]: input_userauth_request: invalid user es [preauth] Jan 9 09:40:10 host sshd[22212]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:40:10 host sshd[22212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.172.225 Jan 9 09:40:11 host sshd[22212]: Failed password for invalid user es from 64.227.172.225 port 59936 ssh2 Jan 9 09:40:11 host sshd[22212]: Received disconnect from 64.227.172.225 port 59936:11: Bye Bye [preauth] Jan 9 09:40:11 host sshd[22212]: Disconnected from 64.227.172.225 port 59936 [preauth] Jan 9 09:41:07 host sshd[22390]: Invalid user ftpguest from 103.206.223.178 port 33930 Jan 9 09:41:07 host sshd[22390]: input_userauth_request: invalid user ftpguest [preauth] Jan 9 09:41:07 host sshd[22390]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:41:07 host sshd[22390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.206.223.178 Jan 9 09:41:09 host sshd[22390]: Failed password for invalid user ftpguest from 103.206.223.178 port 33930 ssh2 Jan 9 09:41:09 host sshd[22390]: Received disconnect from 103.206.223.178 port 33930:11: Bye Bye [preauth] Jan 9 09:41:09 host sshd[22390]: Disconnected from 103.206.223.178 port 33930 [preauth] Jan 9 09:41:34 host sshd[22457]: Invalid user postgres from 181.191.9.163 port 47026 Jan 9 09:41:34 host sshd[22457]: input_userauth_request: invalid user postgres [preauth] Jan 9 09:41:34 host sshd[22457]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:41:34 host sshd[22457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.9.163 Jan 9 09:41:36 host sshd[22457]: Failed password for invalid user postgres from 181.191.9.163 port 47026 ssh2 Jan 9 09:43:22 host sshd[22771]: Invalid user jared from 103.206.223.178 port 34520 Jan 9 09:43:22 host sshd[22771]: input_userauth_request: invalid user jared [preauth] Jan 9 09:43:22 host sshd[22771]: pam_unix(sshd:auth): check pass; user unknown Jan 9 09:43:22 host sshd[22771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.206.223.178 Jan 9 09:43:24 host sshd[22771]: Failed password for invalid user jared from 103.206.223.178 port 34520 ssh2 Jan 9 09:43:24 host sshd[22771]: Received disconnect from 103.206.223.178 port 34520:11: Bye Bye [preauth] Jan 9 09:43:24 host sshd[22771]: Disconnected from 103.206.223.178 port 34520 [preauth] Jan 9 10:11:36 host sshd[27127]: User root from 154.221.27.150 not allowed because not listed in AllowUsers Jan 9 10:11:36 host sshd[27127]: input_userauth_request: invalid user root [preauth] Jan 9 10:11:36 host unix_chkpwd[27130]: password check failed for user (root) Jan 9 10:11:36 host sshd[27127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.27.150 user=root Jan 9 10:11:36 host sshd[27127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:11:36 host sshd[27121]: Invalid user baobao from 167.172.148.74 port 41302 Jan 9 10:11:36 host sshd[27121]: input_userauth_request: invalid user baobao [preauth] Jan 9 10:11:36 host sshd[27121]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:11:36 host sshd[27121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.148.74 Jan 9 10:11:38 host sshd[27127]: Failed password for invalid user root from 154.221.27.150 port 44700 ssh2 Jan 9 10:11:38 host sshd[27127]: Received disconnect from 154.221.27.150 port 44700:11: Bye Bye [preauth] Jan 9 10:11:38 host sshd[27127]: Disconnected from 154.221.27.150 port 44700 [preauth] Jan 9 10:11:38 host sshd[27121]: Failed password for invalid user baobao from 167.172.148.74 port 41302 ssh2 Jan 9 10:11:39 host sshd[27121]: Received disconnect from 167.172.148.74 port 41302:11: Bye Bye [preauth] Jan 9 10:11:39 host sshd[27121]: Disconnected from 167.172.148.74 port 41302 [preauth] Jan 9 10:14:23 host sshd[27461]: User root from 144.217.13.134 not allowed because not listed in AllowUsers Jan 9 10:14:23 host sshd[27461]: input_userauth_request: invalid user root [preauth] Jan 9 10:14:23 host unix_chkpwd[27465]: password check failed for user (root) Jan 9 10:14:23 host sshd[27461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.13.134 user=root Jan 9 10:14:23 host sshd[27461]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:14:24 host sshd[27461]: Failed password for invalid user root from 144.217.13.134 port 48684 ssh2 Jan 9 10:14:25 host sshd[27461]: Received disconnect from 144.217.13.134 port 48684:11: Bye Bye [preauth] Jan 9 10:14:25 host sshd[27461]: Disconnected from 144.217.13.134 port 48684 [preauth] Jan 9 10:14:58 host sshd[27536]: Invalid user yaoming from 62.210.53.50 port 37440 Jan 9 10:14:58 host sshd[27536]: input_userauth_request: invalid user yaoming [preauth] Jan 9 10:14:58 host sshd[27536]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:14:58 host sshd[27536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.53.50 Jan 9 10:15:00 host sshd[27536]: Failed password for invalid user yaoming from 62.210.53.50 port 37440 ssh2 Jan 9 10:15:00 host sshd[27536]: Received disconnect from 62.210.53.50 port 37440:11: Bye Bye [preauth] Jan 9 10:15:00 host sshd[27536]: Disconnected from 62.210.53.50 port 37440 [preauth] Jan 9 10:15:59 host sshd[27779]: Invalid user bo from 194.110.203.109 port 44662 Jan 9 10:15:59 host sshd[27779]: input_userauth_request: invalid user bo [preauth] Jan 9 10:15:59 host sshd[27779]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:15:59 host sshd[27779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 10:16:00 host sshd[27779]: Failed password for invalid user bo from 194.110.203.109 port 44662 ssh2 Jan 9 10:16:04 host sshd[27779]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:16:06 host sshd[27779]: Failed password for invalid user bo from 194.110.203.109 port 44662 ssh2 Jan 9 10:16:09 host sshd[27779]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:16:12 host sshd[27779]: Failed password for invalid user bo from 194.110.203.109 port 44662 ssh2 Jan 9 10:16:15 host sshd[27779]: Connection closed by 194.110.203.109 port 44662 [preauth] Jan 9 10:16:15 host sshd[27779]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 10:16:56 host sshd[27925]: Invalid user miaomiao from 167.172.148.74 port 46412 Jan 9 10:16:56 host sshd[27925]: input_userauth_request: invalid user miaomiao [preauth] Jan 9 10:16:56 host sshd[27925]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:16:56 host sshd[27925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.148.74 Jan 9 10:16:59 host sshd[27925]: Failed password for invalid user miaomiao from 167.172.148.74 port 46412 ssh2 Jan 9 10:16:59 host sshd[27925]: Received disconnect from 167.172.148.74 port 46412:11: Bye Bye [preauth] Jan 9 10:16:59 host sshd[27925]: Disconnected from 167.172.148.74 port 46412 [preauth] Jan 9 10:17:53 host sshd[28043]: Invalid user buchaqian from 117.6.86.134 port 11785 Jan 9 10:17:53 host sshd[28043]: input_userauth_request: invalid user buchaqian [preauth] Jan 9 10:17:53 host sshd[28043]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:17:53 host sshd[28043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.6.86.134 Jan 9 10:17:55 host sshd[28043]: Failed password for invalid user buchaqian from 117.6.86.134 port 11785 ssh2 Jan 9 10:17:55 host sshd[28043]: Received disconnect from 117.6.86.134 port 11785:11: Bye Bye [preauth] Jan 9 10:17:55 host sshd[28043]: Disconnected from 117.6.86.134 port 11785 [preauth] Jan 9 10:17:57 host sshd[28051]: User root from 144.217.13.134 not allowed because not listed in AllowUsers Jan 9 10:17:57 host sshd[28051]: input_userauth_request: invalid user root [preauth] Jan 9 10:17:57 host unix_chkpwd[28056]: password check failed for user (root) Jan 9 10:17:57 host sshd[28051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.13.134 user=root Jan 9 10:17:57 host sshd[28051]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:17:59 host sshd[28051]: Failed password for invalid user root from 144.217.13.134 port 48862 ssh2 Jan 9 10:17:59 host sshd[28051]: Received disconnect from 144.217.13.134 port 48862:11: Bye Bye [preauth] Jan 9 10:17:59 host sshd[28051]: Disconnected from 144.217.13.134 port 48862 [preauth] Jan 9 10:18:04 host sshd[28107]: User root from 167.172.148.74 not allowed because not listed in AllowUsers Jan 9 10:18:04 host sshd[28107]: input_userauth_request: invalid user root [preauth] Jan 9 10:18:04 host unix_chkpwd[28111]: password check failed for user (root) Jan 9 10:18:04 host sshd[28107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.148.74 user=root Jan 9 10:18:04 host sshd[28107]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:18:06 host sshd[28107]: Failed password for invalid user root from 167.172.148.74 port 46938 ssh2 Jan 9 10:18:14 host sshd[28161]: Invalid user o from 154.221.27.150 port 45797 Jan 9 10:18:14 host sshd[28161]: input_userauth_request: invalid user o [preauth] Jan 9 10:18:14 host sshd[28161]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:18:14 host sshd[28161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.27.150 Jan 9 10:18:16 host sshd[28161]: Failed password for invalid user o from 154.221.27.150 port 45797 ssh2 Jan 9 10:18:16 host sshd[28161]: Received disconnect from 154.221.27.150 port 45797:11: Bye Bye [preauth] Jan 9 10:18:16 host sshd[28161]: Disconnected from 154.221.27.150 port 45797 [preauth] Jan 9 10:18:32 host sshd[28241]: User root from 62.210.53.50 not allowed because not listed in AllowUsers Jan 9 10:18:32 host sshd[28241]: input_userauth_request: invalid user root [preauth] Jan 9 10:18:32 host unix_chkpwd[28244]: password check failed for user (root) Jan 9 10:18:32 host sshd[28241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.53.50 user=root Jan 9 10:18:32 host sshd[28241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:18:33 host sshd[28241]: Failed password for invalid user root from 62.210.53.50 port 56086 ssh2 Jan 9 10:18:33 host sshd[28241]: Received disconnect from 62.210.53.50 port 56086:11: Bye Bye [preauth] Jan 9 10:18:33 host sshd[28241]: Disconnected from 62.210.53.50 port 56086 [preauth] Jan 9 10:20:31 host sshd[28526]: User root from 117.6.86.134 not allowed because not listed in AllowUsers Jan 9 10:20:31 host sshd[28526]: input_userauth_request: invalid user root [preauth] Jan 9 10:20:31 host unix_chkpwd[28531]: password check failed for user (root) Jan 9 10:20:31 host sshd[28526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.6.86.134 user=root Jan 9 10:20:31 host sshd[28526]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:20:33 host sshd[28526]: Failed password for invalid user root from 117.6.86.134 port 54277 ssh2 Jan 9 10:20:34 host sshd[28526]: Received disconnect from 117.6.86.134 port 54277:11: Bye Bye [preauth] Jan 9 10:20:34 host sshd[28526]: Disconnected from 117.6.86.134 port 54277 [preauth] Jan 9 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=ugotscom user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=wwwnexidigital user-17=mrsclean user-18=bonifacegroup user-19=wwwevmhonda user-20=straightcurve user-21=wwwletsstalkfood user-22=vfmassets user-23=shalinijames user-24=wwwtestugo user-25=pmcresources user-26=disposeat user-27=wwwkmaorg user-28=remysagr user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 10:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iRFjAhRJ7LndKJfa.~ Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iRFjAhRJ7LndKJfa.~' Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iRFjAhRJ7LndKJfa.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 10:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 10:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 10:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 10:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 10:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 10:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 10:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 10:22:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 10:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 10:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 10:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 10:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 10:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 10:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 10:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 10:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 10:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 10:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 10:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 10:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 10:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 10:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 10:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 10:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 10:22:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 10:22:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 10:28:17 host sshd[29842]: Did not receive identification string from 92.255.85.115 port 55344 Jan 9 10:42:05 host sshd[31677]: Did not receive identification string from 202.61.200.158 port 47042 Jan 9 10:50:08 host sshd[364]: User root from 103.92.101.115 not allowed because not listed in AllowUsers Jan 9 10:50:08 host sshd[364]: input_userauth_request: invalid user root [preauth] Jan 9 10:50:08 host unix_chkpwd[366]: password check failed for user (root) Jan 9 10:50:08 host sshd[364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.101.115 user=root Jan 9 10:50:08 host sshd[364]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:50:10 host sshd[364]: Failed password for invalid user root from 103.92.101.115 port 41188 ssh2 Jan 9 10:50:10 host sshd[364]: Received disconnect from 103.92.101.115 port 41188:11: Bye Bye [preauth] Jan 9 10:50:10 host sshd[364]: Disconnected from 103.92.101.115 port 41188 [preauth] Jan 9 10:50:16 host sshd[373]: User root from 45.143.201.62 not allowed because not listed in AllowUsers Jan 9 10:50:16 host sshd[373]: input_userauth_request: invalid user root [preauth] Jan 9 10:50:16 host unix_chkpwd[376]: password check failed for user (root) Jan 9 10:50:16 host sshd[373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.143.201.62 user=root Jan 9 10:50:16 host sshd[373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:50:18 host sshd[373]: Failed password for invalid user root from 45.143.201.62 port 29564 ssh2 Jan 9 10:50:19 host unix_chkpwd[379]: password check failed for user (root) Jan 9 10:50:19 host sshd[373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:50:20 host sshd[373]: Failed password for invalid user root from 45.143.201.62 port 29564 ssh2 Jan 9 10:50:20 host unix_chkpwd[381]: password check failed for user (root) Jan 9 10:50:20 host sshd[373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:50:22 host sshd[373]: Failed password for invalid user root from 45.143.201.62 port 29564 ssh2 Jan 9 10:50:22 host unix_chkpwd[384]: password check failed for user (root) Jan 9 10:50:22 host sshd[373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:50:23 host sshd[373]: Failed password for invalid user root from 45.143.201.62 port 29564 ssh2 Jan 9 10:50:24 host unix_chkpwd[387]: password check failed for user (root) Jan 9 10:50:24 host sshd[373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:50:25 host sshd[373]: Failed password for invalid user root from 45.143.201.62 port 29564 ssh2 Jan 9 10:50:26 host unix_chkpwd[391]: password check failed for user (root) Jan 9 10:50:26 host sshd[373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:50:28 host sshd[373]: Failed password for invalid user root from 45.143.201.62 port 29564 ssh2 Jan 9 10:50:28 host sshd[373]: error: maximum authentication attempts exceeded for invalid user root from 45.143.201.62 port 29564 ssh2 [preauth] Jan 9 10:50:28 host sshd[373]: Disconnecting: Too many authentication failures [preauth] Jan 9 10:50:28 host sshd[373]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.143.201.62 user=root Jan 9 10:50:28 host sshd[373]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 9 10:51:45 host sshd[630]: Did not receive identification string from 104.152.52.147 port 41503 Jan 9 10:52:01 host sshd[672]: Invalid user wangyi from 106.251.237.178 port 36834 Jan 9 10:52:01 host sshd[672]: input_userauth_request: invalid user wangyi [preauth] Jan 9 10:52:01 host sshd[672]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:52:01 host sshd[672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.251.237.178 Jan 9 10:52:03 host sshd[672]: Failed password for invalid user wangyi from 106.251.237.178 port 36834 ssh2 Jan 9 10:52:03 host sshd[672]: Received disconnect from 106.251.237.178 port 36834:11: Bye Bye [preauth] Jan 9 10:52:03 host sshd[672]: Disconnected from 106.251.237.178 port 36834 [preauth] Jan 9 10:52:49 host sshd[794]: User root from 165.22.223.41 not allowed because not listed in AllowUsers Jan 9 10:52:49 host sshd[794]: input_userauth_request: invalid user root [preauth] Jan 9 10:52:49 host unix_chkpwd[796]: password check failed for user (root) Jan 9 10:52:49 host sshd[794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.223.41 user=root Jan 9 10:52:49 host sshd[794]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:52:50 host sshd[790]: User root from 106.251.237.178 not allowed because not listed in AllowUsers Jan 9 10:52:50 host sshd[790]: input_userauth_request: invalid user root [preauth] Jan 9 10:52:50 host unix_chkpwd[800]: password check failed for user (root) Jan 9 10:52:50 host sshd[790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.251.237.178 user=root Jan 9 10:52:50 host sshd[790]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:52:51 host sshd[794]: Failed password for invalid user root from 165.22.223.41 port 54024 ssh2 Jan 9 10:52:51 host sshd[794]: Received disconnect from 165.22.223.41 port 54024:11: Bye Bye [preauth] Jan 9 10:52:51 host sshd[794]: Disconnected from 165.22.223.41 port 54024 [preauth] Jan 9 10:52:51 host sshd[790]: Failed password for invalid user root from 106.251.237.178 port 45658 ssh2 Jan 9 10:52:51 host sshd[790]: Received disconnect from 106.251.237.178 port 45658:11: Bye Bye [preauth] Jan 9 10:52:51 host sshd[790]: Disconnected from 106.251.237.178 port 45658 [preauth] Jan 9 10:53:06 host sshd[981]: Invalid user yaoyao from 82.64.139.41 port 50602 Jan 9 10:53:06 host sshd[981]: input_userauth_request: invalid user yaoyao [preauth] Jan 9 10:53:06 host sshd[981]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:53:06 host sshd[981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.139.41 Jan 9 10:53:09 host sshd[981]: Failed password for invalid user yaoyao from 82.64.139.41 port 50602 ssh2 Jan 9 10:53:09 host sshd[981]: Received disconnect from 82.64.139.41 port 50602:11: Bye Bye [preauth] Jan 9 10:53:09 host sshd[981]: Disconnected from 82.64.139.41 port 50602 [preauth] Jan 9 10:54:36 host sshd[1235]: User root from 103.98.17.224 not allowed because not listed in AllowUsers Jan 9 10:54:36 host sshd[1235]: input_userauth_request: invalid user root [preauth] Jan 9 10:54:36 host unix_chkpwd[1240]: password check failed for user (root) Jan 9 10:54:36 host sshd[1235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.17.224 user=root Jan 9 10:54:36 host sshd[1235]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:54:37 host sshd[1235]: Failed password for invalid user root from 103.98.17.224 port 59680 ssh2 Jan 9 10:54:38 host sshd[1235]: Received disconnect from 103.98.17.224 port 59680:11: Bye Bye [preauth] Jan 9 10:54:38 host sshd[1235]: Disconnected from 103.98.17.224 port 59680 [preauth] Jan 9 10:55:01 host sshd[1311]: User root from 148.153.110.76 not allowed because not listed in AllowUsers Jan 9 10:55:01 host sshd[1311]: input_userauth_request: invalid user root [preauth] Jan 9 10:55:01 host unix_chkpwd[1315]: password check failed for user (root) Jan 9 10:55:01 host sshd[1311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.153.110.76 user=root Jan 9 10:55:01 host sshd[1311]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:55:04 host sshd[1311]: Failed password for invalid user root from 148.153.110.76 port 44590 ssh2 Jan 9 10:55:04 host sshd[1311]: Received disconnect from 148.153.110.76 port 44590:11: Bye Bye [preauth] Jan 9 10:55:04 host sshd[1311]: Disconnected from 148.153.110.76 port 44590 [preauth] Jan 9 10:55:23 host sshd[1377]: Invalid user liujian from 4.246.208.224 port 1024 Jan 9 10:55:23 host sshd[1377]: input_userauth_request: invalid user liujian [preauth] Jan 9 10:55:23 host sshd[1377]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:55:23 host sshd[1377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.246.208.224 Jan 9 10:55:24 host sshd[1377]: Failed password for invalid user liujian from 4.246.208.224 port 1024 ssh2 Jan 9 10:55:24 host sshd[1377]: Received disconnect from 4.246.208.224 port 1024:11: Bye Bye [preauth] Jan 9 10:55:24 host sshd[1377]: Disconnected from 4.246.208.224 port 1024 [preauth] Jan 9 10:55:39 host sshd[1459]: Invalid user zhangyue from 103.92.101.115 port 46408 Jan 9 10:55:39 host sshd[1459]: input_userauth_request: invalid user zhangyue [preauth] Jan 9 10:55:39 host sshd[1459]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:55:39 host sshd[1459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.101.115 Jan 9 10:55:42 host sshd[1459]: Failed password for invalid user zhangyue from 103.92.101.115 port 46408 ssh2 Jan 9 10:55:42 host sshd[1459]: Received disconnect from 103.92.101.115 port 46408:11: Bye Bye [preauth] Jan 9 10:55:42 host sshd[1459]: Disconnected from 103.92.101.115 port 46408 [preauth] Jan 9 10:56:15 host sshd[1579]: Invalid user yaoyao from 148.153.110.76 port 44414 Jan 9 10:56:15 host sshd[1579]: input_userauth_request: invalid user yaoyao [preauth] Jan 9 10:56:15 host sshd[1579]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:56:15 host sshd[1579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.153.110.76 Jan 9 10:56:18 host sshd[1579]: Failed password for invalid user yaoyao from 148.153.110.76 port 44414 ssh2 Jan 9 10:56:18 host sshd[1579]: Received disconnect from 148.153.110.76 port 44414:11: Bye Bye [preauth] Jan 9 10:56:18 host sshd[1579]: Disconnected from 148.153.110.76 port 44414 [preauth] Jan 9 10:56:18 host sshd[1585]: User root from 82.64.139.41 not allowed because not listed in AllowUsers Jan 9 10:56:18 host sshd[1585]: input_userauth_request: invalid user root [preauth] Jan 9 10:56:18 host unix_chkpwd[1590]: password check failed for user (root) Jan 9 10:56:18 host sshd[1585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.139.41 user=root Jan 9 10:56:18 host sshd[1585]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:56:20 host sshd[1585]: Failed password for invalid user root from 82.64.139.41 port 51918 ssh2 Jan 9 10:56:20 host sshd[1585]: Received disconnect from 82.64.139.41 port 51918:11: Bye Bye [preauth] Jan 9 10:56:20 host sshd[1585]: Disconnected from 82.64.139.41 port 51918 [preauth] Jan 9 10:56:46 host sshd[1713]: User root from 43.131.30.179 not allowed because not listed in AllowUsers Jan 9 10:56:46 host sshd[1713]: input_userauth_request: invalid user root [preauth] Jan 9 10:56:47 host unix_chkpwd[1719]: password check failed for user (root) Jan 9 10:56:47 host sshd[1713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.179 user=root Jan 9 10:56:47 host sshd[1713]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:56:48 host sshd[1713]: Failed password for invalid user root from 43.131.30.179 port 50590 ssh2 Jan 9 10:56:49 host sshd[1713]: Received disconnect from 43.131.30.179 port 50590:11: Bye Bye [preauth] Jan 9 10:56:49 host sshd[1713]: Disconnected from 43.131.30.179 port 50590 [preauth] Jan 9 10:56:55 host sshd[1741]: Invalid user fengyun from 165.22.223.41 port 58658 Jan 9 10:56:55 host sshd[1741]: input_userauth_request: invalid user fengyun [preauth] Jan 9 10:56:55 host sshd[1741]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:56:55 host sshd[1741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.223.41 Jan 9 10:56:56 host sshd[1741]: Failed password for invalid user fengyun from 165.22.223.41 port 58658 ssh2 Jan 9 10:56:56 host sshd[1741]: Received disconnect from 165.22.223.41 port 58658:11: Bye Bye [preauth] Jan 9 10:56:56 host sshd[1741]: Disconnected from 165.22.223.41 port 58658 [preauth] Jan 9 10:57:16 host sshd[1817]: User root from 185.237.14.115 not allowed because not listed in AllowUsers Jan 9 10:57:16 host sshd[1817]: input_userauth_request: invalid user root [preauth] Jan 9 10:57:16 host unix_chkpwd[1823]: password check failed for user (root) Jan 9 10:57:16 host sshd[1817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.237.14.115 user=root Jan 9 10:57:16 host sshd[1817]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:57:18 host sshd[1817]: Failed password for invalid user root from 185.237.14.115 port 46470 ssh2 Jan 9 10:57:19 host sshd[1817]: Received disconnect from 185.237.14.115 port 46470:11: Bye Bye [preauth] Jan 9 10:57:19 host sshd[1817]: Disconnected from 185.237.14.115 port 46470 [preauth] Jan 9 10:57:19 host sshd[1827]: User root from 4.246.208.224 not allowed because not listed in AllowUsers Jan 9 10:57:19 host sshd[1827]: input_userauth_request: invalid user root [preauth] Jan 9 10:57:19 host unix_chkpwd[1832]: password check failed for user (root) Jan 9 10:57:19 host sshd[1827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.246.208.224 user=root Jan 9 10:57:19 host sshd[1827]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:57:21 host sshd[1827]: Failed password for invalid user root from 4.246.208.224 port 1024 ssh2 Jan 9 10:57:21 host sshd[1827]: Received disconnect from 4.246.208.224 port 1024:11: Bye Bye [preauth] Jan 9 10:57:21 host sshd[1827]: Disconnected from 4.246.208.224 port 1024 [preauth] Jan 9 10:57:59 host sshd[1949]: Invalid user zhaoyang from 43.131.30.179 port 45808 Jan 9 10:57:59 host sshd[1949]: input_userauth_request: invalid user zhaoyang [preauth] Jan 9 10:57:59 host sshd[1949]: pam_unix(sshd:auth): check pass; user unknown Jan 9 10:57:59 host sshd[1949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.179 Jan 9 10:58:01 host sshd[1949]: Failed password for invalid user zhaoyang from 43.131.30.179 port 45808 ssh2 Jan 9 10:58:01 host sshd[1949]: Received disconnect from 43.131.30.179 port 45808:11: Bye Bye [preauth] Jan 9 10:58:01 host sshd[1949]: Disconnected from 43.131.30.179 port 45808 [preauth] Jan 9 10:59:04 host sshd[2214]: User root from 103.98.17.224 not allowed because not listed in AllowUsers Jan 9 10:59:04 host sshd[2214]: input_userauth_request: invalid user root [preauth] Jan 9 10:59:04 host unix_chkpwd[2217]: password check failed for user (root) Jan 9 10:59:04 host sshd[2214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.17.224 user=root Jan 9 10:59:04 host sshd[2214]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 10:59:06 host sshd[2214]: Failed password for invalid user root from 103.98.17.224 port 42306 ssh2 Jan 9 10:59:06 host sshd[2214]: Received disconnect from 103.98.17.224 port 42306:11: Bye Bye [preauth] Jan 9 10:59:06 host sshd[2214]: Disconnected from 103.98.17.224 port 42306 [preauth] Jan 9 11:00:20 host sshd[2393]: User root from 185.237.14.115 not allowed because not listed in AllowUsers Jan 9 11:00:20 host sshd[2393]: input_userauth_request: invalid user root [preauth] Jan 9 11:00:20 host unix_chkpwd[2397]: password check failed for user (root) Jan 9 11:00:20 host sshd[2393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.237.14.115 user=root Jan 9 11:00:20 host sshd[2393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 11:00:22 host sshd[2393]: Failed password for invalid user root from 185.237.14.115 port 39852 ssh2 Jan 9 11:00:22 host sshd[2393]: Received disconnect from 185.237.14.115 port 39852:11: Bye Bye [preauth] Jan 9 11:00:22 host sshd[2393]: Disconnected from 185.237.14.115 port 39852 [preauth] Jan 9 11:06:54 host sshd[3305]: Invalid user billy from 107.189.30.59 port 51876 Jan 9 11:06:54 host sshd[3305]: input_userauth_request: invalid user billy [preauth] Jan 9 11:06:54 host sshd[3305]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:06:54 host sshd[3305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 9 11:06:56 host sshd[3305]: Failed password for invalid user billy from 107.189.30.59 port 51876 ssh2 Jan 9 11:06:57 host sshd[3305]: Connection closed by 107.189.30.59 port 51876 [preauth] Jan 9 11:10:49 host sshd[3924]: Did not receive identification string from 106.12.172.93 port 35686 Jan 9 11:10:51 host sshd[3926]: Invalid user steam from 106.12.172.93 port 43104 Jan 9 11:10:51 host sshd[3926]: input_userauth_request: invalid user steam [preauth] Jan 9 11:10:51 host sshd[3940]: Invalid user postgres from 106.12.172.93 port 43110 Jan 9 11:10:51 host sshd[3940]: input_userauth_request: invalid user postgres [preauth] Jan 9 11:10:51 host sshd[3941]: User centos from 106.12.172.93 not allowed because not listed in AllowUsers Jan 9 11:10:51 host sshd[3941]: input_userauth_request: invalid user centos [preauth] Jan 9 11:10:51 host sshd[3942]: User mail from 106.12.172.93 not allowed because not listed in AllowUsers Jan 9 11:10:51 host sshd[3942]: input_userauth_request: invalid user mail [preauth] Jan 9 11:10:51 host sshd[3937]: Invalid user emqx from 106.12.172.93 port 43072 Jan 9 11:10:51 host sshd[3937]: input_userauth_request: invalid user emqx [preauth] Jan 9 11:10:51 host sshd[3947]: Invalid user oracle from 106.12.172.93 port 43140 Jan 9 11:10:51 host sshd[3947]: input_userauth_request: invalid user oracle [preauth] Jan 9 11:10:51 host sshd[3945]: Invalid user ftpuser from 106.12.172.93 port 43106 Jan 9 11:10:51 host sshd[3945]: input_userauth_request: invalid user ftpuser [preauth] Jan 9 11:10:51 host sshd[3943]: Invalid user ec2-user from 106.12.172.93 port 43112 Jan 9 11:10:51 host sshd[3943]: input_userauth_request: invalid user ec2-user [preauth] Jan 9 11:10:51 host sshd[3950]: Invalid user devops from 106.12.172.93 port 43132 Jan 9 11:10:51 host sshd[3950]: input_userauth_request: invalid user devops [preauth] Jan 9 11:10:51 host sshd[3926]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:51 host sshd[3926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:51 host sshd[3948]: User centos from 106.12.172.93 not allowed because not listed in AllowUsers Jan 9 11:10:51 host sshd[3948]: input_userauth_request: invalid user centos [preauth] Jan 9 11:10:51 host sshd[3936]: Invalid user www from 106.12.172.93 port 43096 Jan 9 11:10:51 host sshd[3936]: input_userauth_request: invalid user www [preauth] Jan 9 11:10:52 host sshd[3957]: Invalid user oracle from 106.12.172.93 port 43136 Jan 9 11:10:52 host sshd[3957]: input_userauth_request: invalid user oracle [preauth] Jan 9 11:10:52 host sshd[3956]: Invalid user ubuntu from 106.12.172.93 port 43074 Jan 9 11:10:52 host sshd[3956]: input_userauth_request: invalid user ubuntu [preauth] Jan 9 11:10:52 host sshd[3960]: Invalid user oracle from 106.12.172.93 port 43088 Jan 9 11:10:52 host sshd[3960]: input_userauth_request: invalid user oracle [preauth] Jan 9 11:10:52 host sshd[3940]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host unix_chkpwd[3986]: password check failed for user (centos) Jan 9 11:10:52 host sshd[3941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 user=centos Jan 9 11:10:52 host unix_chkpwd[3987]: password check failed for user (mail) Jan 9 11:10:52 host sshd[3942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 user=mail Jan 9 11:10:52 host sshd[3942]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail" Jan 9 11:10:52 host sshd[3947]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3945]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3963]: Invalid user ftpuser from 106.12.172.93 port 43078 Jan 9 11:10:52 host sshd[3963]: input_userauth_request: invalid user ftpuser [preauth] Jan 9 11:10:52 host sshd[3943]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3950]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3965]: Invalid user teamspeak from 106.12.172.93 port 43076 Jan 9 11:10:52 host sshd[3965]: input_userauth_request: invalid user teamspeak [preauth] Jan 9 11:10:52 host sshd[3964]: User centos from 106.12.172.93 not allowed because not listed in AllowUsers Jan 9 11:10:52 host sshd[3964]: input_userauth_request: invalid user centos [preauth] Jan 9 11:10:52 host unix_chkpwd[3988]: password check failed for user (centos) Jan 9 11:10:52 host sshd[3948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 user=centos Jan 9 11:10:52 host sshd[3967]: Invalid user dockeradmin from 106.12.172.93 port 43092 Jan 9 11:10:52 host sshd[3967]: input_userauth_request: invalid user dockeradmin [preauth] Jan 9 11:10:52 host sshd[3957]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3936]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3937]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3927]: Invalid user ftpuser from 106.12.172.93 port 43118 Jan 9 11:10:52 host sshd[3927]: input_userauth_request: invalid user ftpuser [preauth] Jan 9 11:10:52 host sshd[3971]: Invalid user test from 106.12.172.93 port 43100 Jan 9 11:10:52 host sshd[3971]: input_userauth_request: invalid user test [preauth] Jan 9 11:10:52 host sshd[3956]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3933]: Invalid user ubuntu from 106.12.172.93 port 43122 Jan 9 11:10:52 host sshd[3933]: input_userauth_request: invalid user ubuntu [preauth] Jan 9 11:10:52 host sshd[3960]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3931]: Invalid user elastic from 106.12.172.93 port 43142 Jan 9 11:10:52 host sshd[3931]: input_userauth_request: invalid user elastic [preauth] Jan 9 11:10:52 host sshd[3963]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host unix_chkpwd[3991]: password check failed for user (centos) Jan 9 11:10:52 host sshd[3964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 user=centos Jan 9 11:10:52 host sshd[3927]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3967]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3933]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3931]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:52 host sshd[3971]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:52 host sshd[3971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:53 host sshd[3976]: Invalid user gitlab-runner from 106.12.172.93 port 43144 Jan 9 11:10:53 host sshd[3976]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 9 11:10:53 host sshd[3975]: Invalid user guest from 106.12.172.93 port 43116 Jan 9 11:10:53 host sshd[3975]: input_userauth_request: invalid user guest [preauth] Jan 9 11:10:53 host sshd[3979]: Invalid user steam from 106.12.172.93 port 43082 Jan 9 11:10:53 host sshd[3979]: input_userauth_request: invalid user steam [preauth] Jan 9 11:10:53 host sshd[3981]: Invalid user ansadmin from 106.12.172.93 port 43094 Jan 9 11:10:53 host sshd[3981]: input_userauth_request: invalid user ansadmin [preauth] Jan 9 11:10:53 host sshd[3975]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:53 host sshd[3975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:53 host sshd[3928]: Invalid user testuser from 106.12.172.93 port 43134 Jan 9 11:10:53 host sshd[3928]: input_userauth_request: invalid user testuser [preauth] Jan 9 11:10:53 host sshd[3979]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:53 host sshd[3979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:53 host sshd[3965]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:10:53 host sshd[3965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.172.93 Jan 9 11:10:53 host sshd[3926]: Failed password for invalid user steam from 106.12.172.93 port 43104 ssh2 Jan 9 11:10:54 host sshd[3940]: Failed password for invalid user postgres from 106.12.172.93 port 43110 ssh2 Jan 9 11:10:54 host sshd[3941]: Failed password for invalid user centos from 106.12.172.93 port 43108 ssh2 Jan 9 11:10:54 host sshd[3942]: Failed password for invalid user mail from 106.12.172.93 port 43148 ssh2 Jan 9 11:10:54 host sshd[3947]: Failed password for invalid user oracle from 106.12.172.93 port 43140 ssh2 Jan 9 11:10:54 host sshd[3945]: Failed password for invalid user ftpuser from 106.12.172.93 port 43106 ssh2 Jan 9 11:10:54 host sshd[3943]: Failed password for invalid user ec2-user from 106.12.172.93 port 43112 ssh2 Jan 9 11:10:54 host sshd[3950]: Failed password for invalid user devops from 106.12.172.93 port 43132 ssh2 Jan 9 11:10:54 host sshd[3948]: Failed password for invalid user centos from 106.12.172.93 port 43130 ssh2 Jan 9 11:10:54 host sshd[3957]: Failed password for invalid user oracle from 106.12.172.93 port 43136 ssh2 Jan 9 11:10:54 host sshd[3936]: Failed password for invalid user www from 106.12.172.93 port 43096 ssh2 Jan 9 11:10:54 host sshd[3937]: Failed password for invalid user emqx from 106.12.172.93 port 43072 ssh2 Jan 9 11:10:54 host sshd[3956]: Failed password for invalid user ubuntu from 106.12.172.93 port 43074 ssh2 Jan 9 11:10:54 host sshd[3960]: Failed password for invalid user oracle from 106.12.172.93 port 43088 ssh2 Jan 9 11:10:54 host sshd[3963]: Failed password for invalid user ftpuser from 106.12.172.93 port 43078 ssh2 Jan 9 11:10:54 host sshd[3964]: Failed password for invalid user centos from 106.12.172.93 port 43102 ssh2 Jan 9 11:10:54 host sshd[3927]: Failed password for invalid user ftpuser from 106.12.172.93 port 43118 ssh2 Jan 9 11:10:54 host sshd[3967]: Failed password for invalid user dockeradmin from 106.12.172.93 port 43092 ssh2 Jan 9 11:10:54 host sshd[3975]: Failed password for invalid user guest from 106.12.172.93 port 43116 ssh2 Jan 9 11:10:55 host sshd[3933]: Failed password for invalid user ubuntu from 106.12.172.93 port 43122 ssh2 Jan 9 11:10:55 host sshd[3931]: Failed password for invalid user elastic from 106.12.172.93 port 43142 ssh2 Jan 9 11:10:55 host sshd[3971]: Failed password for invalid user test from 106.12.172.93 port 43100 ssh2 Jan 9 11:10:55 host sshd[3979]: Failed password for invalid user steam from 106.12.172.93 port 43082 ssh2 Jan 9 11:10:55 host sshd[3965]: Failed password for invalid user teamspeak from 106.12.172.93 port 43076 ssh2 Jan 9 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=wwwresourcehunte user-7=keralaholi user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=wwwkapin user-17=woodpeck user-18=remysagr user-19=disposeat user-20=wwwkmaorg user-21=wwwnexidigital user-22=mrsclean user-23=palco123 user-24=gifterman user-25=kottayamcalldriv user-26=phmetals user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 11:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-K8yh0rNYxzG0cgkB.~ Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-K8yh0rNYxzG0cgkB.~' Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-K8yh0rNYxzG0cgkB.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 11:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 11:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 11:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 11:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 11:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 11:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 11:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 11:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 11:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 11:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 11:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 11:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 11:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 11:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 11:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 11:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 11:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 11:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 11:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 11:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 11:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 11:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 11:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 11:23:16 host sshd[6154]: Invalid user bzrx1098ui from 92.255.85.115 port 20096 Jan 9 11:23:16 host sshd[6154]: input_userauth_request: invalid user bzrx1098ui [preauth] Jan 9 11:23:17 host sshd[6154]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:23:17 host sshd[6154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 9 11:23:18 host sshd[6154]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 20096 ssh2 Jan 9 11:23:19 host sshd[6154]: Connection reset by 92.255.85.115 port 20096 [preauth] Jan 9 11:34:47 host sshd[7765]: Did not receive identification string from 167.71.166.243 port 47746 Jan 9 11:34:54 host sshd[7777]: Invalid user admin from 92.255.85.115 port 39263 Jan 9 11:34:54 host sshd[7777]: input_userauth_request: invalid user admin [preauth] Jan 9 11:34:54 host sshd[7777]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:34:54 host sshd[7777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 9 11:34:57 host sshd[7777]: Failed password for invalid user admin from 92.255.85.115 port 39263 ssh2 Jan 9 11:34:57 host sshd[7777]: Connection reset by 92.255.85.115 port 39263 [preauth] Jan 9 11:38:32 host sshd[8431]: Invalid user doudou from 181.48.134.66 port 41662 Jan 9 11:38:32 host sshd[8431]: input_userauth_request: invalid user doudou [preauth] Jan 9 11:38:32 host sshd[8431]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:38:32 host sshd[8431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.134.66 Jan 9 11:38:34 host sshd[8431]: Failed password for invalid user doudou from 181.48.134.66 port 41662 ssh2 Jan 9 11:38:34 host sshd[8431]: Received disconnect from 181.48.134.66 port 41662:11: Bye Bye [preauth] Jan 9 11:38:34 host sshd[8431]: Disconnected from 181.48.134.66 port 41662 [preauth] Jan 9 11:39:09 host sshd[8537]: User root from 201.148.20.53 not allowed because not listed in AllowUsers Jan 9 11:39:09 host sshd[8537]: input_userauth_request: invalid user root [preauth] Jan 9 11:39:09 host unix_chkpwd[8543]: password check failed for user (root) Jan 9 11:39:09 host sshd[8537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.148.20.53 user=root Jan 9 11:39:09 host sshd[8537]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 11:39:12 host sshd[8537]: Failed password for invalid user root from 201.148.20.53 port 59078 ssh2 Jan 9 11:39:12 host sshd[8537]: Received disconnect from 201.148.20.53 port 59078:11: Bye Bye [preauth] Jan 9 11:39:12 host sshd[8537]: Disconnected from 201.148.20.53 port 59078 [preauth] Jan 9 11:43:40 host sshd[9345]: Invalid user kangkang from 139.59.27.92 port 42244 Jan 9 11:43:40 host sshd[9345]: input_userauth_request: invalid user kangkang [preauth] Jan 9 11:43:40 host sshd[9345]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:43:40 host sshd[9345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.27.92 Jan 9 11:43:42 host sshd[9345]: Failed password for invalid user kangkang from 139.59.27.92 port 42244 ssh2 Jan 9 11:43:42 host sshd[9345]: Received disconnect from 139.59.27.92 port 42244:11: Bye Bye [preauth] Jan 9 11:43:42 host sshd[9345]: Disconnected from 139.59.27.92 port 42244 [preauth] Jan 9 11:45:58 host sshd[9756]: User root from 201.148.20.53 not allowed because not listed in AllowUsers Jan 9 11:45:58 host sshd[9756]: input_userauth_request: invalid user root [preauth] Jan 9 11:45:58 host unix_chkpwd[9761]: password check failed for user (root) Jan 9 11:45:58 host sshd[9756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.148.20.53 user=root Jan 9 11:45:58 host sshd[9756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 11:46:00 host sshd[9756]: Failed password for invalid user root from 201.148.20.53 port 32852 ssh2 Jan 9 11:46:01 host sshd[9756]: Received disconnect from 201.148.20.53 port 32852:11: Bye Bye [preauth] Jan 9 11:46:01 host sshd[9756]: Disconnected from 201.148.20.53 port 32852 [preauth] Jan 9 11:46:18 host sshd[9837]: Invalid user support from 92.255.85.115 port 34605 Jan 9 11:46:18 host sshd[9837]: input_userauth_request: invalid user support [preauth] Jan 9 11:46:19 host sshd[9837]: pam_unix(sshd:auth): check pass; user unknown Jan 9 11:46:19 host sshd[9837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 9 11:46:21 host sshd[9837]: Failed password for invalid user support from 92.255.85.115 port 34605 ssh2 Jan 9 11:47:05 host sshd[10003]: Connection closed by 167.71.166.243 port 57180 [preauth] Jan 9 11:48:21 host sshd[10259]: User root from 139.59.27.92 not allowed because not listed in AllowUsers Jan 9 11:48:21 host sshd[10259]: input_userauth_request: invalid user root [preauth] Jan 9 11:48:21 host unix_chkpwd[10262]: password check failed for user (root) Jan 9 11:48:21 host sshd[10259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.27.92 user=root Jan 9 11:48:21 host sshd[10259]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 11:48:23 host sshd[10259]: Failed password for invalid user root from 139.59.27.92 port 56356 ssh2 Jan 9 11:48:23 host sshd[10259]: Received disconnect from 139.59.27.92 port 56356:11: Bye Bye [preauth] Jan 9 11:48:23 host sshd[10259]: Disconnected from 139.59.27.92 port 56356 [preauth] Jan 9 12:09:40 host sshd[14434]: Did not receive identification string from 154.89.5.218 port 54830 Jan 9 12:09:55 host sshd[14438]: Connection closed by 154.89.5.218 port 54900 [preauth] Jan 9 12:15:15 host sshd[15396]: Connection closed by 172.105.128.12 port 9626 [preauth] Jan 9 12:15:17 host sshd[15399]: Connection closed by 172.105.128.12 port 33176 [preauth] Jan 9 12:15:19 host sshd[15432]: Connection closed by 172.105.128.12 port 33184 [preauth] Jan 9 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwrmswll user-10=wwwresourcehunte user-11=keralaholi user-12=disposeat user-13=remysagr user-14=wwwkmaorg user-15=wwwkapin user-16=woodpeck user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=straightcurve user-24=wwwletsstalkfood user-25=kottayamcalldriv user-26=phmetals user-27=gifterman user-28=palco123 user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 12:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-S3L4RyNZsKfdtfUx.~ Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-S3L4RyNZsKfdtfUx.~' Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-S3L4RyNZsKfdtfUx.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 12:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 12:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 12:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 12:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 12:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 12:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 12:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 12:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 12:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 12:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 12:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 12:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 12:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 12:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 12:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 12:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 12:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 12:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 12:22:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 12:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 12:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 12:22:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 12:22:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 12:26:50 host sshd[17327]: Invalid user bp from 194.110.203.109 port 55522 Jan 9 12:26:50 host sshd[17327]: input_userauth_request: invalid user bp [preauth] Jan 9 12:26:50 host sshd[17327]: pam_unix(sshd:auth): check pass; user unknown Jan 9 12:26:50 host sshd[17327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 12:26:52 host sshd[17327]: Failed password for invalid user bp from 194.110.203.109 port 55522 ssh2 Jan 9 12:26:55 host sshd[17327]: pam_unix(sshd:auth): check pass; user unknown Jan 9 12:26:58 host sshd[17327]: Failed password for invalid user bp from 194.110.203.109 port 55522 ssh2 Jan 9 12:27:01 host sshd[17327]: pam_unix(sshd:auth): check pass; user unknown Jan 9 12:27:03 host sshd[17327]: Failed password for invalid user bp from 194.110.203.109 port 55522 ssh2 Jan 9 12:27:06 host sshd[17327]: Connection closed by 194.110.203.109 port 55522 [preauth] Jan 9 12:27:06 host sshd[17327]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 13:13:30 host sshd[24378]: Invalid user liuyang from 68.183.239.156 port 47034 Jan 9 13:13:30 host sshd[24378]: input_userauth_request: invalid user liuyang [preauth] Jan 9 13:13:30 host sshd[24378]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:13:30 host sshd[24378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.239.156 Jan 9 13:13:32 host sshd[24378]: Failed password for invalid user liuyang from 68.183.239.156 port 47034 ssh2 Jan 9 13:13:32 host sshd[24378]: Received disconnect from 68.183.239.156 port 47034:11: Bye Bye [preauth] Jan 9 13:13:32 host sshd[24378]: Disconnected from 68.183.239.156 port 47034 [preauth] Jan 9 13:14:14 host sshd[24439]: User root from 41.65.224.89 not allowed because not listed in AllowUsers Jan 9 13:14:14 host sshd[24439]: input_userauth_request: invalid user root [preauth] Jan 9 13:14:14 host unix_chkpwd[24443]: password check failed for user (root) Jan 9 13:14:14 host sshd[24439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.65.224.89 user=root Jan 9 13:14:14 host sshd[24439]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:14:17 host sshd[24439]: Failed password for invalid user root from 41.65.224.89 port 60391 ssh2 Jan 9 13:14:17 host sshd[24439]: Received disconnect from 41.65.224.89 port 60391:11: Bye Bye [preauth] Jan 9 13:14:17 host sshd[24439]: Disconnected from 41.65.224.89 port 60391 [preauth] Jan 9 13:15:24 host sshd[24586]: Invalid user zhuang from 20.231.97.12 port 53562 Jan 9 13:15:24 host sshd[24586]: input_userauth_request: invalid user zhuang [preauth] Jan 9 13:15:24 host sshd[24586]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:15:24 host sshd[24586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.231.97.12 Jan 9 13:15:26 host sshd[24586]: Failed password for invalid user zhuang from 20.231.97.12 port 53562 ssh2 Jan 9 13:15:26 host sshd[24586]: Received disconnect from 20.231.97.12 port 53562:11: Bye Bye [preauth] Jan 9 13:15:26 host sshd[24586]: Disconnected from 20.231.97.12 port 53562 [preauth] Jan 9 13:15:32 host sshd[24621]: Invalid user doudou from 174.61.227.28 port 32988 Jan 9 13:15:32 host sshd[24621]: input_userauth_request: invalid user doudou [preauth] Jan 9 13:15:32 host sshd[24621]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:15:32 host sshd[24621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.61.227.28 Jan 9 13:15:34 host sshd[24621]: Failed password for invalid user doudou from 174.61.227.28 port 32988 ssh2 Jan 9 13:15:35 host sshd[24621]: Received disconnect from 174.61.227.28 port 32988:11: Bye Bye [preauth] Jan 9 13:15:35 host sshd[24621]: Disconnected from 174.61.227.28 port 32988 [preauth] Jan 9 13:17:00 host sshd[24917]: User root from 34.80.102.160 not allowed because not listed in AllowUsers Jan 9 13:17:00 host sshd[24917]: input_userauth_request: invalid user root [preauth] Jan 9 13:17:00 host unix_chkpwd[24920]: password check failed for user (root) Jan 9 13:17:00 host sshd[24917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.102.160 user=root Jan 9 13:17:00 host sshd[24917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:17:02 host sshd[24917]: Failed password for invalid user root from 34.80.102.160 port 60080 ssh2 Jan 9 13:17:02 host sshd[24917]: Received disconnect from 34.80.102.160 port 60080:11: Bye Bye [preauth] Jan 9 13:17:02 host sshd[24917]: Disconnected from 34.80.102.160 port 60080 [preauth] Jan 9 13:17:23 host sshd[24953]: User root from 123.30.187.208 not allowed because not listed in AllowUsers Jan 9 13:17:23 host sshd[24953]: input_userauth_request: invalid user root [preauth] Jan 9 13:17:23 host unix_chkpwd[24956]: password check failed for user (root) Jan 9 13:17:23 host sshd[24953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.187.208 user=root Jan 9 13:17:23 host sshd[24953]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:17:24 host sshd[24953]: Failed password for invalid user root from 123.30.187.208 port 42552 ssh2 Jan 9 13:17:24 host sshd[24953]: Received disconnect from 123.30.187.208 port 42552:11: Bye Bye [preauth] Jan 9 13:17:24 host sshd[24953]: Disconnected from 123.30.187.208 port 42552 [preauth] Jan 9 13:17:34 host sshd[24991]: Invalid user zhangkai from 43.153.105.206 port 42550 Jan 9 13:17:34 host sshd[24991]: input_userauth_request: invalid user zhangkai [preauth] Jan 9 13:17:34 host sshd[24991]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:17:34 host sshd[24991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.105.206 Jan 9 13:17:36 host sshd[24991]: Failed password for invalid user zhangkai from 43.153.105.206 port 42550 ssh2 Jan 9 13:17:36 host sshd[24991]: Received disconnect from 43.153.105.206 port 42550:11: Bye Bye [preauth] Jan 9 13:17:36 host sshd[24991]: Disconnected from 43.153.105.206 port 42550 [preauth] Jan 9 13:17:41 host sshd[25002]: Invalid user yangjing from 41.65.224.89 port 53099 Jan 9 13:17:41 host sshd[25002]: input_userauth_request: invalid user yangjing [preauth] Jan 9 13:17:41 host sshd[25002]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:17:41 host sshd[25002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.65.224.89 Jan 9 13:17:43 host sshd[25002]: Failed password for invalid user yangjing from 41.65.224.89 port 53099 ssh2 Jan 9 13:17:43 host sshd[25002]: Received disconnect from 41.65.224.89 port 53099:11: Bye Bye [preauth] Jan 9 13:17:43 host sshd[25002]: Disconnected from 41.65.224.89 port 53099 [preauth] Jan 9 13:18:31 host sshd[25129]: User root from 34.80.102.160 not allowed because not listed in AllowUsers Jan 9 13:18:31 host sshd[25129]: input_userauth_request: invalid user root [preauth] Jan 9 13:18:32 host unix_chkpwd[25132]: password check failed for user (root) Jan 9 13:18:32 host sshd[25129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.102.160 user=root Jan 9 13:18:32 host sshd[25129]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:18:33 host sshd[25129]: Failed password for invalid user root from 34.80.102.160 port 47406 ssh2 Jan 9 13:18:33 host sshd[25129]: Received disconnect from 34.80.102.160 port 47406:11: Bye Bye [preauth] Jan 9 13:18:33 host sshd[25129]: Disconnected from 34.80.102.160 port 47406 [preauth] Jan 9 13:18:34 host sshd[25133]: User root from 174.61.227.28 not allowed because not listed in AllowUsers Jan 9 13:18:34 host sshd[25133]: input_userauth_request: invalid user root [preauth] Jan 9 13:18:34 host unix_chkpwd[25171]: password check failed for user (root) Jan 9 13:18:34 host sshd[25133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.61.227.28 user=root Jan 9 13:18:34 host sshd[25133]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:18:35 host sshd[25133]: Failed password for invalid user root from 174.61.227.28 port 34108 ssh2 Jan 9 13:18:35 host sshd[25133]: Received disconnect from 174.61.227.28 port 34108:11: Bye Bye [preauth] Jan 9 13:18:35 host sshd[25133]: Disconnected from 174.61.227.28 port 34108 [preauth] Jan 9 13:18:41 host sshd[25209]: Invalid user zhangjian from 68.183.239.156 port 36928 Jan 9 13:18:41 host sshd[25209]: input_userauth_request: invalid user zhangjian [preauth] Jan 9 13:18:41 host sshd[25209]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:18:41 host sshd[25209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.239.156 Jan 9 13:18:43 host sshd[25209]: Failed password for invalid user zhangjian from 68.183.239.156 port 36928 ssh2 Jan 9 13:18:43 host sshd[25209]: Received disconnect from 68.183.239.156 port 36928:11: Bye Bye [preauth] Jan 9 13:18:43 host sshd[25209]: Disconnected from 68.183.239.156 port 36928 [preauth] Jan 9 13:19:09 host sshd[25256]: User root from 43.153.105.206 not allowed because not listed in AllowUsers Jan 9 13:19:09 host sshd[25256]: input_userauth_request: invalid user root [preauth] Jan 9 13:19:10 host unix_chkpwd[25259]: password check failed for user (root) Jan 9 13:19:10 host sshd[25256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.105.206 user=root Jan 9 13:19:10 host sshd[25256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:19:12 host sshd[25256]: Failed password for invalid user root from 43.153.105.206 port 43682 ssh2 Jan 9 13:19:12 host sshd[25256]: Received disconnect from 43.153.105.206 port 43682:11: Bye Bye [preauth] Jan 9 13:19:12 host sshd[25256]: Disconnected from 43.153.105.206 port 43682 [preauth] Jan 9 13:19:29 host sshd[25305]: User root from 20.231.97.12 not allowed because not listed in AllowUsers Jan 9 13:19:29 host sshd[25305]: input_userauth_request: invalid user root [preauth] Jan 9 13:19:29 host unix_chkpwd[25329]: password check failed for user (root) Jan 9 13:19:29 host sshd[25305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.231.97.12 user=root Jan 9 13:19:29 host sshd[25305]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:19:31 host sshd[25305]: Failed password for invalid user root from 20.231.97.12 port 34930 ssh2 Jan 9 13:19:31 host sshd[25305]: Received disconnect from 20.231.97.12 port 34930:11: Bye Bye [preauth] Jan 9 13:19:31 host sshd[25305]: Disconnected from 20.231.97.12 port 34930 [preauth] Jan 9 13:19:42 host sshd[25376]: Invalid user qianqian from 123.30.187.208 port 45160 Jan 9 13:19:42 host sshd[25376]: input_userauth_request: invalid user qianqian [preauth] Jan 9 13:19:42 host sshd[25376]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:19:42 host sshd[25376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.187.208 Jan 9 13:19:44 host sshd[25376]: Failed password for invalid user qianqian from 123.30.187.208 port 45160 ssh2 Jan 9 13:19:44 host sshd[25376]: Received disconnect from 123.30.187.208 port 45160:11: Bye Bye [preauth] Jan 9 13:19:44 host sshd[25376]: Disconnected from 123.30.187.208 port 45160 [preauth] Jan 9 13:20:07 host sshd[25486]: Invalid user baobei from 68.183.239.156 port 43000 Jan 9 13:20:07 host sshd[25486]: input_userauth_request: invalid user baobei [preauth] Jan 9 13:20:07 host sshd[25486]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:20:07 host sshd[25486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.239.156 Jan 9 13:20:09 host sshd[25486]: Failed password for invalid user baobei from 68.183.239.156 port 43000 ssh2 Jan 9 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=wwwkapin user-20=woodpeck user-21=palco123 user-22=gifterman user-23=kottayamcalldriv user-24=phmetals user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 13:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-InYt2619zTxfs1Ji.~ Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-InYt2619zTxfs1Ji.~' Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-InYt2619zTxfs1Ji.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 13:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 13:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 13:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 13:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 13:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 13:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 13:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 13:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 13:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 13:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 13:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 13:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 13:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 13:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 13:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 13:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 13:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 13:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 13:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 13:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 13:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 13:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 13:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 13:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 13:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 13:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 13:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 13:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 13:40:10 host sshd[28419]: Invalid user songsong from 143.110.190.247 port 39886 Jan 9 13:40:10 host sshd[28419]: input_userauth_request: invalid user songsong [preauth] Jan 9 13:40:10 host sshd[28419]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:40:10 host sshd[28419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.190.247 Jan 9 13:40:13 host sshd[28419]: Failed password for invalid user songsong from 143.110.190.247 port 39886 ssh2 Jan 9 13:40:13 host sshd[28419]: Received disconnect from 143.110.190.247 port 39886:11: Bye Bye [preauth] Jan 9 13:40:13 host sshd[28419]: Disconnected from 143.110.190.247 port 39886 [preauth] Jan 9 13:41:20 host sshd[28569]: User root from 130.162.37.223 not allowed because not listed in AllowUsers Jan 9 13:41:20 host sshd[28569]: input_userauth_request: invalid user root [preauth] Jan 9 13:41:20 host unix_chkpwd[28571]: password check failed for user (root) Jan 9 13:41:20 host sshd[28569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.37.223 user=root Jan 9 13:41:20 host sshd[28569]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:41:22 host sshd[28569]: Failed password for invalid user root from 130.162.37.223 port 60236 ssh2 Jan 9 13:41:22 host sshd[28569]: Received disconnect from 130.162.37.223 port 60236:11: Bye Bye [preauth] Jan 9 13:41:22 host sshd[28569]: Disconnected from 130.162.37.223 port 60236 [preauth] Jan 9 13:43:23 host sshd[28970]: User root from 130.162.37.223 not allowed because not listed in AllowUsers Jan 9 13:43:23 host sshd[28970]: input_userauth_request: invalid user root [preauth] Jan 9 13:43:23 host unix_chkpwd[28974]: password check failed for user (root) Jan 9 13:43:23 host sshd[28970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.37.223 user=root Jan 9 13:43:23 host sshd[28970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:43:26 host sshd[28970]: Failed password for invalid user root from 130.162.37.223 port 54212 ssh2 Jan 9 13:43:27 host sshd[29015]: User root from 143.110.190.247 not allowed because not listed in AllowUsers Jan 9 13:43:27 host sshd[29015]: input_userauth_request: invalid user root [preauth] Jan 9 13:43:27 host unix_chkpwd[29017]: password check failed for user (root) Jan 9 13:43:27 host sshd[29015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.190.247 user=root Jan 9 13:43:27 host sshd[29015]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:43:29 host sshd[29015]: Failed password for invalid user root from 143.110.190.247 port 49038 ssh2 Jan 9 13:43:29 host sshd[29015]: Received disconnect from 143.110.190.247 port 49038:11: Bye Bye [preauth] Jan 9 13:43:29 host sshd[29015]: Disconnected from 143.110.190.247 port 49038 [preauth] Jan 9 13:43:38 host sshd[29086]: Invalid user liuchang from 162.243.116.41 port 43380 Jan 9 13:43:38 host sshd[29086]: input_userauth_request: invalid user liuchang [preauth] Jan 9 13:43:38 host sshd[29086]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:43:38 host sshd[29086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.116.41 Jan 9 13:43:40 host sshd[29086]: Failed password for invalid user liuchang from 162.243.116.41 port 43380 ssh2 Jan 9 13:43:40 host sshd[29086]: Received disconnect from 162.243.116.41 port 43380:11: Bye Bye [preauth] Jan 9 13:43:40 host sshd[29086]: Disconnected from 162.243.116.41 port 43380 [preauth] Jan 9 13:44:27 host sshd[29395]: Invalid user chenxiao from 197.5.145.150 port 25900 Jan 9 13:44:27 host sshd[29395]: input_userauth_request: invalid user chenxiao [preauth] Jan 9 13:44:27 host sshd[29395]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:44:27 host sshd[29395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.150 Jan 9 13:44:28 host sshd[29465]: User root from 174.138.21.174 not allowed because not listed in AllowUsers Jan 9 13:44:28 host sshd[29465]: input_userauth_request: invalid user root [preauth] Jan 9 13:44:28 host unix_chkpwd[29468]: password check failed for user (root) Jan 9 13:44:28 host sshd[29465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.174 user=root Jan 9 13:44:28 host sshd[29465]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:44:30 host sshd[29395]: Failed password for invalid user chenxiao from 197.5.145.150 port 25900 ssh2 Jan 9 13:44:30 host sshd[29465]: Failed password for invalid user root from 174.138.21.174 port 52087 ssh2 Jan 9 13:44:30 host sshd[29465]: Received disconnect from 174.138.21.174 port 52087:11: Bye Bye [preauth] Jan 9 13:44:30 host sshd[29465]: Disconnected from 174.138.21.174 port 52087 [preauth] Jan 9 13:44:30 host sshd[29395]: Received disconnect from 197.5.145.150 port 25900:11: Bye Bye [preauth] Jan 9 13:44:30 host sshd[29395]: Disconnected from 197.5.145.150 port 25900 [preauth] Jan 9 13:45:34 host sshd[29716]: Invalid user zhangjing from 167.172.246.83 port 46668 Jan 9 13:45:34 host sshd[29716]: input_userauth_request: invalid user zhangjing [preauth] Jan 9 13:45:34 host sshd[29716]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:45:34 host sshd[29716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.246.83 Jan 9 13:45:36 host sshd[29716]: Failed password for invalid user zhangjing from 167.172.246.83 port 46668 ssh2 Jan 9 13:45:36 host sshd[29716]: Received disconnect from 167.172.246.83 port 46668:11: Bye Bye [preauth] Jan 9 13:45:36 host sshd[29716]: Disconnected from 167.172.246.83 port 46668 [preauth] Jan 9 13:45:45 host sshd[29754]: User root from 107.172.201.220 not allowed because not listed in AllowUsers Jan 9 13:45:45 host sshd[29754]: input_userauth_request: invalid user root [preauth] Jan 9 13:45:45 host unix_chkpwd[29758]: password check failed for user (root) Jan 9 13:45:45 host sshd[29754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.201.220 user=root Jan 9 13:45:45 host sshd[29754]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:45:48 host sshd[29754]: Failed password for invalid user root from 107.172.201.220 port 52508 ssh2 Jan 9 13:45:48 host sshd[29754]: Received disconnect from 107.172.201.220 port 52508:11: Bye Bye [preauth] Jan 9 13:45:48 host sshd[29754]: Disconnected from 107.172.201.220 port 52508 [preauth] Jan 9 13:45:51 host sshd[29763]: Invalid user zhangbo from 192.241.154.229 port 37786 Jan 9 13:45:51 host sshd[29763]: input_userauth_request: invalid user zhangbo [preauth] Jan 9 13:45:51 host sshd[29763]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:45:51 host sshd[29763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.154.229 Jan 9 13:45:53 host sshd[29763]: Failed password for invalid user zhangbo from 192.241.154.229 port 37786 ssh2 Jan 9 13:45:53 host sshd[29763]: Received disconnect from 192.241.154.229 port 37786:11: Bye Bye [preauth] Jan 9 13:45:53 host sshd[29763]: Disconnected from 192.241.154.229 port 37786 [preauth] Jan 9 13:46:10 host sshd[29812]: User root from 150.136.32.211 not allowed because not listed in AllowUsers Jan 9 13:46:10 host sshd[29812]: input_userauth_request: invalid user root [preauth] Jan 9 13:46:10 host unix_chkpwd[29815]: password check failed for user (root) Jan 9 13:46:10 host sshd[29812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.32.211 user=root Jan 9 13:46:10 host sshd[29812]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:46:12 host sshd[29812]: Failed password for invalid user root from 150.136.32.211 port 17832 ssh2 Jan 9 13:46:13 host sshd[29812]: Received disconnect from 150.136.32.211 port 17832:11: Bye Bye [preauth] Jan 9 13:46:13 host sshd[29812]: Disconnected from 150.136.32.211 port 17832 [preauth] Jan 9 13:47:36 host sshd[30072]: User root from 134.122.26.172 not allowed because not listed in AllowUsers Jan 9 13:47:36 host sshd[30072]: input_userauth_request: invalid user root [preauth] Jan 9 13:47:36 host unix_chkpwd[30078]: password check failed for user (root) Jan 9 13:47:36 host sshd[30072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.26.172 user=root Jan 9 13:47:36 host sshd[30072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:47:38 host sshd[30072]: Failed password for invalid user root from 134.122.26.172 port 46204 ssh2 Jan 9 13:47:39 host sshd[30072]: Received disconnect from 134.122.26.172 port 46204:11: Bye Bye [preauth] Jan 9 13:47:39 host sshd[30072]: Disconnected from 134.122.26.172 port 46204 [preauth] Jan 9 13:48:15 host sshd[30267]: User root from 162.243.116.41 not allowed because not listed in AllowUsers Jan 9 13:48:15 host sshd[30267]: input_userauth_request: invalid user root [preauth] Jan 9 13:48:15 host unix_chkpwd[30271]: password check failed for user (root) Jan 9 13:48:15 host sshd[30267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.116.41 user=root Jan 9 13:48:15 host sshd[30267]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:48:17 host sshd[30267]: Failed password for invalid user root from 162.243.116.41 port 37878 ssh2 Jan 9 13:48:17 host sshd[30267]: Received disconnect from 162.243.116.41 port 37878:11: Bye Bye [preauth] Jan 9 13:48:17 host sshd[30267]: Disconnected from 162.243.116.41 port 37878 [preauth] Jan 9 13:48:55 host sshd[30388]: User root from 192.241.154.229 not allowed because not listed in AllowUsers Jan 9 13:48:55 host sshd[30388]: input_userauth_request: invalid user root [preauth] Jan 9 13:48:55 host unix_chkpwd[30394]: password check failed for user (root) Jan 9 13:48:55 host sshd[30388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.154.229 user=root Jan 9 13:48:55 host sshd[30388]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:48:56 host sshd[30388]: Failed password for invalid user root from 192.241.154.229 port 34802 ssh2 Jan 9 13:48:56 host sshd[30388]: Received disconnect from 192.241.154.229 port 34802:11: Bye Bye [preauth] Jan 9 13:48:56 host sshd[30388]: Disconnected from 192.241.154.229 port 34802 [preauth] Jan 9 13:49:18 host sshd[30474]: User root from 174.138.21.174 not allowed because not listed in AllowUsers Jan 9 13:49:18 host sshd[30474]: input_userauth_request: invalid user root [preauth] Jan 9 13:49:18 host unix_chkpwd[30476]: password check failed for user (root) Jan 9 13:49:18 host sshd[30474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.174 user=root Jan 9 13:49:18 host sshd[30474]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:49:20 host sshd[30474]: Failed password for invalid user root from 174.138.21.174 port 48729 ssh2 Jan 9 13:49:26 host sshd[30522]: User root from 167.172.246.83 not allowed because not listed in AllowUsers Jan 9 13:49:26 host sshd[30522]: input_userauth_request: invalid user root [preauth] Jan 9 13:49:26 host unix_chkpwd[30527]: password check failed for user (root) Jan 9 13:49:26 host sshd[30522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.246.83 user=root Jan 9 13:49:26 host sshd[30522]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:49:28 host sshd[30522]: Failed password for invalid user root from 167.172.246.83 port 32926 ssh2 Jan 9 13:49:28 host sshd[30522]: Received disconnect from 167.172.246.83 port 32926:11: Bye Bye [preauth] Jan 9 13:49:28 host sshd[30522]: Disconnected from 167.172.246.83 port 32926 [preauth] Jan 9 13:49:35 host sshd[30588]: Invalid user wangying from 107.172.201.220 port 38868 Jan 9 13:49:35 host sshd[30588]: input_userauth_request: invalid user wangying [preauth] Jan 9 13:49:35 host sshd[30588]: pam_unix(sshd:auth): check pass; user unknown Jan 9 13:49:35 host sshd[30588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.201.220 Jan 9 13:49:35 host sshd[30597]: User root from 150.136.32.211 not allowed because not listed in AllowUsers Jan 9 13:49:35 host sshd[30597]: input_userauth_request: invalid user root [preauth] Jan 9 13:49:35 host unix_chkpwd[30600]: password check failed for user (root) Jan 9 13:49:35 host sshd[30597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.32.211 user=root Jan 9 13:49:35 host sshd[30597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:49:36 host sshd[30588]: Failed password for invalid user wangying from 107.172.201.220 port 38868 ssh2 Jan 9 13:49:37 host sshd[30588]: Received disconnect from 107.172.201.220 port 38868:11: Bye Bye [preauth] Jan 9 13:49:37 host sshd[30588]: Disconnected from 107.172.201.220 port 38868 [preauth] Jan 9 13:49:37 host sshd[30597]: Failed password for invalid user root from 150.136.32.211 port 60602 ssh2 Jan 9 13:49:37 host sshd[30597]: Received disconnect from 150.136.32.211 port 60602:11: Bye Bye [preauth] Jan 9 13:49:37 host sshd[30597]: Disconnected from 150.136.32.211 port 60602 [preauth] Jan 9 13:49:42 host sshd[30669]: User root from 134.122.26.172 not allowed because not listed in AllowUsers Jan 9 13:49:42 host sshd[30669]: input_userauth_request: invalid user root [preauth] Jan 9 13:49:42 host unix_chkpwd[30672]: password check failed for user (root) Jan 9 13:49:42 host sshd[30669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.26.172 user=root Jan 9 13:49:42 host sshd[30669]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:49:43 host sshd[30669]: Failed password for invalid user root from 134.122.26.172 port 49742 ssh2 Jan 9 13:49:44 host sshd[30669]: Received disconnect from 134.122.26.172 port 49742:11: Bye Bye [preauth] Jan 9 13:49:44 host sshd[30669]: Disconnected from 134.122.26.172 port 49742 [preauth] Jan 9 13:50:30 host sshd[30805]: User root from 197.5.145.150 not allowed because not listed in AllowUsers Jan 9 13:50:30 host sshd[30805]: input_userauth_request: invalid user root [preauth] Jan 9 13:50:30 host unix_chkpwd[30829]: password check failed for user (root) Jan 9 13:50:30 host sshd[30805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.150 user=root Jan 9 13:50:30 host sshd[30805]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 13:50:32 host sshd[30805]: Failed password for invalid user root from 197.5.145.150 port 25908 ssh2 Jan 9 13:50:32 host sshd[30805]: Received disconnect from 197.5.145.150 port 25908:11: Bye Bye [preauth] Jan 9 13:50:32 host sshd[30805]: Disconnected from 197.5.145.150 port 25908 [preauth] Jan 9 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=wwwresourcehunte user-7=keralaholi user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=woodpeck user-17=wwwkapin user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=palco123 user-24=gifterman user-25=kottayamcalldriv user-26=phmetals user-27=wwwletsstalkfood user-28=straightcurve user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 14:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UKZ61ZneeDtmRE8c.~ Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UKZ61ZneeDtmRE8c.~' Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UKZ61ZneeDtmRE8c.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 14:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 14:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 14:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 14:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 14:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 14:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 14:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 14:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 14:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 14:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 14:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 14:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 14:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 14:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 14:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 14:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 14:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 14:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 14:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 14:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 14:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 14:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 14:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 14:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 14:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 14:24:40 host sshd[4045]: Invalid user haiyang from 46.101.31.237 port 55806 Jan 9 14:24:40 host sshd[4045]: input_userauth_request: invalid user haiyang [preauth] Jan 9 14:24:40 host sshd[4045]: pam_unix(sshd:auth): check pass; user unknown Jan 9 14:24:40 host sshd[4045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.31.237 Jan 9 14:24:42 host sshd[4045]: Failed password for invalid user haiyang from 46.101.31.237 port 55806 ssh2 Jan 9 14:24:42 host sshd[4045]: Received disconnect from 46.101.31.237 port 55806:11: Bye Bye [preauth] Jan 9 14:24:42 host sshd[4045]: Disconnected from 46.101.31.237 port 55806 [preauth] Jan 9 14:27:45 host sshd[4522]: Did not receive identification string from 8.219.76.192 port 61000 Jan 9 14:30:05 host sshd[4777]: User root from 46.101.31.237 not allowed because not listed in AllowUsers Jan 9 14:30:05 host sshd[4777]: input_userauth_request: invalid user root [preauth] Jan 9 14:30:05 host unix_chkpwd[4783]: password check failed for user (root) Jan 9 14:30:05 host sshd[4777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.31.237 user=root Jan 9 14:30:05 host sshd[4777]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 14:30:07 host sshd[4777]: Failed password for invalid user root from 46.101.31.237 port 50960 ssh2 Jan 9 14:30:07 host sshd[4777]: Received disconnect from 46.101.31.237 port 50960:11: Bye Bye [preauth] Jan 9 14:30:07 host sshd[4777]: Disconnected from 46.101.31.237 port 50960 [preauth] Jan 9 14:33:24 host sshd[5256]: Invalid user bq from 194.110.203.109 port 50830 Jan 9 14:33:24 host sshd[5256]: input_userauth_request: invalid user bq [preauth] Jan 9 14:33:24 host sshd[5256]: pam_unix(sshd:auth): check pass; user unknown Jan 9 14:33:24 host sshd[5256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 14:33:26 host sshd[5256]: Failed password for invalid user bq from 194.110.203.109 port 50830 ssh2 Jan 9 14:33:30 host sshd[5256]: pam_unix(sshd:auth): check pass; user unknown Jan 9 14:33:32 host sshd[5256]: Failed password for invalid user bq from 194.110.203.109 port 50830 ssh2 Jan 9 14:33:35 host sshd[5256]: pam_unix(sshd:auth): check pass; user unknown Jan 9 14:33:37 host sshd[5256]: Failed password for invalid user bq from 194.110.203.109 port 50830 ssh2 Jan 9 14:33:40 host sshd[5256]: Connection closed by 194.110.203.109 port 50830 [preauth] Jan 9 14:33:40 host sshd[5256]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 14:41:27 host sshd[6282]: Invalid user jiangfeng from 181.48.196.246 port 42889 Jan 9 14:41:27 host sshd[6282]: input_userauth_request: invalid user jiangfeng [preauth] Jan 9 14:41:27 host sshd[6282]: pam_unix(sshd:auth): check pass; user unknown Jan 9 14:41:27 host sshd[6282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.196.246 Jan 9 14:41:29 host sshd[6282]: Failed password for invalid user jiangfeng from 181.48.196.246 port 42889 ssh2 Jan 9 14:41:29 host sshd[6282]: Received disconnect from 181.48.196.246 port 42889:11: Bye Bye [preauth] Jan 9 14:41:29 host sshd[6282]: Disconnected from 181.48.196.246 port 42889 [preauth] Jan 9 14:55:48 host sshd[8547]: Connection closed by 181.48.196.246 port 60402 [preauth] Jan 9 15:01:30 host sshd[9319]: Connection closed by 181.48.196.246 port 55670 [preauth] Jan 9 15:04:11 host sshd[9745]: Invalid user woainiwoaini from 181.48.196.246 port 53651 Jan 9 15:04:11 host sshd[9745]: input_userauth_request: invalid user woainiwoaini [preauth] Jan 9 15:04:11 host sshd[9745]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:04:11 host sshd[9745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.196.246 Jan 9 15:04:13 host sshd[9745]: Failed password for invalid user woainiwoaini from 181.48.196.246 port 53651 ssh2 Jan 9 15:04:14 host sshd[9745]: Received disconnect from 181.48.196.246 port 53651:11: Bye Bye [preauth] Jan 9 15:04:14 host sshd[9745]: Disconnected from 181.48.196.246 port 53651 [preauth] Jan 9 15:06:59 host sshd[10116]: User root from 181.48.196.246 not allowed because not listed in AllowUsers Jan 9 15:06:59 host sshd[10116]: input_userauth_request: invalid user root [preauth] Jan 9 15:06:59 host unix_chkpwd[10120]: password check failed for user (root) Jan 9 15:06:59 host sshd[10116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.196.246 user=root Jan 9 15:06:59 host sshd[10116]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:07:00 host sshd[10116]: Failed password for invalid user root from 181.48.196.246 port 51083 ssh2 Jan 9 15:07:01 host sshd[10116]: Received disconnect from 181.48.196.246 port 51083:11: Bye Bye [preauth] Jan 9 15:07:01 host sshd[10116]: Disconnected from 181.48.196.246 port 51083 [preauth] Jan 9 15:10:18 host sshd[10680]: User adm from 183.111.188.94 not allowed because not listed in AllowUsers Jan 9 15:10:18 host sshd[10680]: input_userauth_request: invalid user adm [preauth] Jan 9 15:10:18 host unix_chkpwd[10685]: password check failed for user (adm) Jan 9 15:10:18 host sshd[10680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.188.94 user=adm Jan 9 15:10:18 host sshd[10680]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "adm" Jan 9 15:10:20 host sshd[10680]: Failed password for invalid user adm from 183.111.188.94 port 57290 ssh2 Jan 9 15:10:20 host sshd[10680]: Received disconnect from 183.111.188.94 port 57290:11: Normal Shutdown, Thank you for playing [preauth] Jan 9 15:10:20 host sshd[10680]: Disconnected from 183.111.188.94 port 57290 [preauth] Jan 9 15:11:26 host sshd[10828]: Invalid user admin2 from 183.111.188.94 port 54352 Jan 9 15:11:26 host sshd[10828]: input_userauth_request: invalid user admin2 [preauth] Jan 9 15:11:26 host sshd[10828]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:11:26 host sshd[10828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.188.94 Jan 9 15:11:27 host sshd[10828]: Failed password for invalid user admin2 from 183.111.188.94 port 54352 ssh2 Jan 9 15:11:28 host sshd[10828]: Received disconnect from 183.111.188.94 port 54352:11: Normal Shutdown, Thank you for playing [preauth] Jan 9 15:11:28 host sshd[10828]: Disconnected from 183.111.188.94 port 54352 [preauth] Jan 9 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 15:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=remysagr user-2=disposeat user-3=wwwkmaorg user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 15:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jYKFz38ZYWs6tLI5.~ Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jYKFz38ZYWs6tLI5.~' Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jYKFz38ZYWs6tLI5.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 15:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 15:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 15:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 15:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 15:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 15:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 15:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 15:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 15:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 15:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 15:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 15:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 15:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 15:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 15:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 15:22:08 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 15:22:10 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 15:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 15:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 15:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 15:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 15:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 15:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 15:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 15:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 15:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 15:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 15:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 15:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 15:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 15:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 15:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 15:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 15:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 15:22:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 15:22:31 host sshd[12573]: User root from 163.172.160.152 not allowed because not listed in AllowUsers Jan 9 15:22:31 host sshd[12573]: input_userauth_request: invalid user root [preauth] Jan 9 15:22:31 host unix_chkpwd[12576]: password check failed for user (root) Jan 9 15:22:31 host sshd[12573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.160.152 user=root Jan 9 15:22:31 host sshd[12573]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:22:33 host sshd[12573]: Failed password for invalid user root from 163.172.160.152 port 55402 ssh2 Jan 9 15:22:33 host sshd[12573]: Received disconnect from 163.172.160.152 port 55402:11: Bye Bye [preauth] Jan 9 15:22:33 host sshd[12573]: Disconnected from 163.172.160.152 port 55402 [preauth] Jan 9 15:23:56 host sshd[12711]: Invalid user huangjie from 138.68.148.157 port 55998 Jan 9 15:23:56 host sshd[12711]: input_userauth_request: invalid user huangjie [preauth] Jan 9 15:23:56 host sshd[12711]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:23:56 host sshd[12711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.157 Jan 9 15:23:57 host sshd[12711]: Failed password for invalid user huangjie from 138.68.148.157 port 55998 ssh2 Jan 9 15:23:57 host sshd[12711]: Received disconnect from 138.68.148.157 port 55998:11: Bye Bye [preauth] Jan 9 15:23:57 host sshd[12711]: Disconnected from 138.68.148.157 port 55998 [preauth] Jan 9 15:23:59 host sshd[12717]: User root from 121.130.111.133 not allowed because not listed in AllowUsers Jan 9 15:23:59 host sshd[12717]: input_userauth_request: invalid user root [preauth] Jan 9 15:23:59 host unix_chkpwd[12720]: password check failed for user (root) Jan 9 15:23:59 host sshd[12717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.111.133 user=root Jan 9 15:23:59 host sshd[12717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:24:01 host sshd[12717]: Failed password for invalid user root from 121.130.111.133 port 34247 ssh2 Jan 9 15:24:01 host sshd[12717]: Received disconnect from 121.130.111.133 port 34247:11: Bye Bye [preauth] Jan 9 15:24:01 host sshd[12717]: Disconnected from 121.130.111.133 port 34247 [preauth] Jan 9 15:24:42 host sshd[12808]: User root from 167.71.203.123 not allowed because not listed in AllowUsers Jan 9 15:24:42 host sshd[12808]: input_userauth_request: invalid user root [preauth] Jan 9 15:24:42 host unix_chkpwd[12810]: password check failed for user (root) Jan 9 15:24:42 host sshd[12808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.203.123 user=root Jan 9 15:24:42 host sshd[12808]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:24:43 host sshd[12808]: Failed password for invalid user root from 167.71.203.123 port 39560 ssh2 Jan 9 15:24:43 host sshd[12808]: Received disconnect from 167.71.203.123 port 39560:11: Bye Bye [preauth] Jan 9 15:24:43 host sshd[12808]: Disconnected from 167.71.203.123 port 39560 [preauth] Jan 9 15:25:08 host sshd[12853]: User root from 133.18.230.227 not allowed because not listed in AllowUsers Jan 9 15:25:08 host sshd[12853]: input_userauth_request: invalid user root [preauth] Jan 9 15:25:08 host unix_chkpwd[12856]: password check failed for user (root) Jan 9 15:25:08 host sshd[12853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.18.230.227 user=root Jan 9 15:25:08 host sshd[12853]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:25:10 host sshd[12853]: Failed password for invalid user root from 133.18.230.227 port 47938 ssh2 Jan 9 15:25:10 host sshd[12853]: Received disconnect from 133.18.230.227 port 47938:11: Bye Bye [preauth] Jan 9 15:25:10 host sshd[12853]: Disconnected from 133.18.230.227 port 47938 [preauth] Jan 9 15:25:18 host sshd[12865]: User root from 198.50.173.145 not allowed because not listed in AllowUsers Jan 9 15:25:18 host sshd[12865]: input_userauth_request: invalid user root [preauth] Jan 9 15:25:18 host unix_chkpwd[12871]: password check failed for user (root) Jan 9 15:25:18 host sshd[12865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.173.145 user=root Jan 9 15:25:18 host sshd[12865]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:25:20 host sshd[12865]: Failed password for invalid user root from 198.50.173.145 port 55210 ssh2 Jan 9 15:25:21 host sshd[12865]: Received disconnect from 198.50.173.145 port 55210:11: Bye Bye [preauth] Jan 9 15:25:21 host sshd[12865]: Disconnected from 198.50.173.145 port 55210 [preauth] Jan 9 15:25:33 host sshd[12908]: Invalid user woxiangni from 189.39.112.93 port 37120 Jan 9 15:25:33 host sshd[12908]: input_userauth_request: invalid user woxiangni [preauth] Jan 9 15:25:33 host sshd[12908]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:25:33 host sshd[12908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.39.112.93 Jan 9 15:25:36 host sshd[12908]: Failed password for invalid user woxiangni from 189.39.112.93 port 37120 ssh2 Jan 9 15:25:36 host sshd[12908]: Received disconnect from 189.39.112.93 port 37120:11: Bye Bye [preauth] Jan 9 15:25:36 host sshd[12908]: Disconnected from 189.39.112.93 port 37120 [preauth] Jan 9 15:25:39 host sshd[12928]: User root from 99.130.111.161 not allowed because not listed in AllowUsers Jan 9 15:25:39 host sshd[12928]: input_userauth_request: invalid user root [preauth] Jan 9 15:25:39 host unix_chkpwd[12933]: password check failed for user (root) Jan 9 15:25:39 host sshd[12928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.130.111.161 user=root Jan 9 15:25:39 host sshd[12928]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:25:41 host sshd[12928]: Failed password for invalid user root from 99.130.111.161 port 54578 ssh2 Jan 9 15:25:41 host sshd[12928]: Received disconnect from 99.130.111.161 port 54578:11: Bye Bye [preauth] Jan 9 15:25:41 host sshd[12928]: Disconnected from 99.130.111.161 port 54578 [preauth] Jan 9 15:26:00 host sshd[12958]: Invalid user wangning from 51.38.237.164 port 36236 Jan 9 15:26:00 host sshd[12958]: input_userauth_request: invalid user wangning [preauth] Jan 9 15:26:00 host sshd[12958]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:26:00 host sshd[12958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.237.164 Jan 9 15:26:02 host sshd[12958]: Failed password for invalid user wangning from 51.38.237.164 port 36236 ssh2 Jan 9 15:26:02 host sshd[12958]: Received disconnect from 51.38.237.164 port 36236:11: Bye Bye [preauth] Jan 9 15:26:02 host sshd[12958]: Disconnected from 51.38.237.164 port 36236 [preauth] Jan 9 15:26:23 host sshd[12992]: User root from 51.89.166.204 not allowed because not listed in AllowUsers Jan 9 15:26:23 host sshd[12992]: input_userauth_request: invalid user root [preauth] Jan 9 15:26:23 host unix_chkpwd[12995]: password check failed for user (root) Jan 9 15:26:23 host sshd[12992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.166.204 user=root Jan 9 15:26:23 host sshd[12992]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:26:24 host sshd[12992]: Failed password for invalid user root from 51.89.166.204 port 35190 ssh2 Jan 9 15:26:25 host sshd[12992]: Received disconnect from 51.89.166.204 port 35190:11: Bye Bye [preauth] Jan 9 15:26:25 host sshd[12992]: Disconnected from 51.89.166.204 port 35190 [preauth] Jan 9 15:26:29 host sshd[13022]: Invalid user wangyi from 157.245.154.129 port 50854 Jan 9 15:26:29 host sshd[13022]: input_userauth_request: invalid user wangyi [preauth] Jan 9 15:26:29 host sshd[13022]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:26:29 host sshd[13022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.154.129 Jan 9 15:26:31 host sshd[13022]: Failed password for invalid user wangyi from 157.245.154.129 port 50854 ssh2 Jan 9 15:26:31 host sshd[13022]: Received disconnect from 157.245.154.129 port 50854:11: Bye Bye [preauth] Jan 9 15:26:31 host sshd[13022]: Disconnected from 157.245.154.129 port 50854 [preauth] Jan 9 15:27:10 host sshd[13097]: User root from 198.50.173.145 not allowed because not listed in AllowUsers Jan 9 15:27:10 host sshd[13097]: input_userauth_request: invalid user root [preauth] Jan 9 15:27:10 host unix_chkpwd[13100]: password check failed for user (root) Jan 9 15:27:10 host sshd[13097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.173.145 user=root Jan 9 15:27:10 host sshd[13097]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:27:12 host sshd[13097]: Failed password for invalid user root from 198.50.173.145 port 59172 ssh2 Jan 9 15:27:12 host sshd[13097]: Received disconnect from 198.50.173.145 port 59172:11: Bye Bye [preauth] Jan 9 15:27:12 host sshd[13097]: Disconnected from 198.50.173.145 port 59172 [preauth] Jan 9 15:27:20 host sshd[13243]: Invalid user wozhiaini from 138.68.148.157 port 56178 Jan 9 15:27:20 host sshd[13243]: input_userauth_request: invalid user wozhiaini [preauth] Jan 9 15:27:20 host sshd[13243]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:27:20 host sshd[13243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.157 Jan 9 15:27:22 host sshd[13243]: Failed password for invalid user wozhiaini from 138.68.148.157 port 56178 ssh2 Jan 9 15:27:22 host sshd[13243]: Received disconnect from 138.68.148.157 port 56178:11: Bye Bye [preauth] Jan 9 15:27:22 host sshd[13243]: Disconnected from 138.68.148.157 port 56178 [preauth] Jan 9 15:27:23 host sshd[13249]: Invalid user gaosheng from 160.120.247.113 port 57838 Jan 9 15:27:23 host sshd[13249]: input_userauth_request: invalid user gaosheng [preauth] Jan 9 15:27:23 host sshd[13249]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:27:23 host sshd[13249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.120.247.113 Jan 9 15:27:24 host sshd[13249]: Failed password for invalid user gaosheng from 160.120.247.113 port 57838 ssh2 Jan 9 15:27:25 host sshd[13249]: Received disconnect from 160.120.247.113 port 57838:11: Bye Bye [preauth] Jan 9 15:27:25 host sshd[13249]: Disconnected from 160.120.247.113 port 57838 [preauth] Jan 9 15:27:28 host sshd[13257]: User root from 163.172.160.152 not allowed because not listed in AllowUsers Jan 9 15:27:28 host sshd[13257]: input_userauth_request: invalid user root [preauth] Jan 9 15:27:28 host unix_chkpwd[13283]: password check failed for user (root) Jan 9 15:27:28 host sshd[13257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.160.152 user=root Jan 9 15:27:28 host sshd[13257]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:27:29 host sshd[13281]: Invalid user oooooo from 99.130.111.161 port 58486 Jan 9 15:27:29 host sshd[13281]: input_userauth_request: invalid user oooooo [preauth] Jan 9 15:27:29 host sshd[13281]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:27:29 host sshd[13281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.130.111.161 Jan 9 15:27:30 host sshd[13257]: Failed password for invalid user root from 163.172.160.152 port 52546 ssh2 Jan 9 15:27:30 host sshd[13257]: Received disconnect from 163.172.160.152 port 52546:11: Bye Bye [preauth] Jan 9 15:27:30 host sshd[13257]: Disconnected from 163.172.160.152 port 52546 [preauth] Jan 9 15:27:31 host sshd[13281]: Failed password for invalid user oooooo from 99.130.111.161 port 58486 ssh2 Jan 9 15:27:31 host sshd[13281]: Received disconnect from 99.130.111.161 port 58486:11: Bye Bye [preauth] Jan 9 15:27:31 host sshd[13281]: Disconnected from 99.130.111.161 port 58486 [preauth] Jan 9 15:27:39 host sshd[13358]: User root from 51.38.237.164 not allowed because not listed in AllowUsers Jan 9 15:27:39 host sshd[13358]: input_userauth_request: invalid user root [preauth] Jan 9 15:27:39 host unix_chkpwd[13361]: password check failed for user (root) Jan 9 15:27:39 host sshd[13358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.237.164 user=root Jan 9 15:27:39 host sshd[13358]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:27:41 host sshd[13358]: Failed password for invalid user root from 51.38.237.164 port 38206 ssh2 Jan 9 15:27:41 host sshd[13358]: Received disconnect from 51.38.237.164 port 38206:11: Bye Bye [preauth] Jan 9 15:27:41 host sshd[13358]: Disconnected from 51.38.237.164 port 38206 [preauth] Jan 9 15:27:43 host sshd[13373]: User root from 133.18.230.227 not allowed because not listed in AllowUsers Jan 9 15:27:43 host sshd[13373]: input_userauth_request: invalid user root [preauth] Jan 9 15:27:43 host unix_chkpwd[13388]: password check failed for user (root) Jan 9 15:27:43 host sshd[13373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.18.230.227 user=root Jan 9 15:27:43 host sshd[13373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:27:45 host sshd[13373]: Failed password for invalid user root from 133.18.230.227 port 48082 ssh2 Jan 9 15:27:45 host sshd[13373]: Received disconnect from 133.18.230.227 port 48082:11: Bye Bye [preauth] Jan 9 15:27:45 host sshd[13373]: Disconnected from 133.18.230.227 port 48082 [preauth] Jan 9 15:27:57 host sshd[13450]: Invalid user joshua from 209.141.56.48 port 59166 Jan 9 15:27:57 host sshd[13450]: input_userauth_request: invalid user joshua [preauth] Jan 9 15:27:57 host sshd[13450]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:27:58 host sshd[13450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 9 15:28:00 host sshd[13450]: Failed password for invalid user joshua from 209.141.56.48 port 59166 ssh2 Jan 9 15:28:00 host sshd[13450]: Connection closed by 209.141.56.48 port 59166 [preauth] Jan 9 15:28:31 host sshd[13523]: User root from 138.68.148.157 not allowed because not listed in AllowUsers Jan 9 15:28:31 host sshd[13523]: input_userauth_request: invalid user root [preauth] Jan 9 15:28:31 host unix_chkpwd[13528]: password check failed for user (root) Jan 9 15:28:31 host sshd[13523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.157 user=root Jan 9 15:28:31 host sshd[13523]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:28:33 host sshd[13523]: Failed password for invalid user root from 138.68.148.157 port 56318 ssh2 Jan 9 15:28:39 host sshd[13580]: Invalid user oooooo from 157.245.154.129 port 53824 Jan 9 15:28:39 host sshd[13580]: input_userauth_request: invalid user oooooo [preauth] Jan 9 15:28:39 host sshd[13580]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:28:39 host sshd[13580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.154.129 Jan 9 15:28:41 host sshd[13580]: Failed password for invalid user oooooo from 157.245.154.129 port 53824 ssh2 Jan 9 15:28:41 host sshd[13580]: Received disconnect from 157.245.154.129 port 53824:11: Bye Bye [preauth] Jan 9 15:28:41 host sshd[13580]: Disconnected from 157.245.154.129 port 53824 [preauth] Jan 9 15:28:44 host sshd[13586]: User root from 167.71.203.123 not allowed because not listed in AllowUsers Jan 9 15:28:44 host sshd[13586]: input_userauth_request: invalid user root [preauth] Jan 9 15:28:44 host unix_chkpwd[13589]: password check failed for user (root) Jan 9 15:28:44 host sshd[13586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.203.123 user=root Jan 9 15:28:44 host sshd[13586]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:28:46 host sshd[13586]: Failed password for invalid user root from 167.71.203.123 port 51718 ssh2 Jan 9 15:28:46 host sshd[13586]: Received disconnect from 167.71.203.123 port 51718:11: Bye Bye [preauth] Jan 9 15:28:46 host sshd[13586]: Disconnected from 167.71.203.123 port 51718 [preauth] Jan 9 15:28:55 host sshd[13630]: Invalid user chenjie from 189.39.112.93 port 46552 Jan 9 15:28:55 host sshd[13630]: input_userauth_request: invalid user chenjie [preauth] Jan 9 15:28:55 host sshd[13630]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:28:55 host sshd[13630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.39.112.93 Jan 9 15:28:58 host sshd[13630]: Failed password for invalid user chenjie from 189.39.112.93 port 46552 ssh2 Jan 9 15:28:58 host sshd[13630]: Received disconnect from 189.39.112.93 port 46552:11: Bye Bye [preauth] Jan 9 15:28:58 host sshd[13630]: Disconnected from 189.39.112.93 port 46552 [preauth] Jan 9 15:29:00 host sshd[13637]: Invalid user shanshan from 121.130.111.133 port 58089 Jan 9 15:29:00 host sshd[13637]: input_userauth_request: invalid user shanshan [preauth] Jan 9 15:29:00 host sshd[13637]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:29:00 host sshd[13637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.111.133 Jan 9 15:29:02 host sshd[13637]: Failed password for invalid user shanshan from 121.130.111.133 port 58089 ssh2 Jan 9 15:29:02 host sshd[13637]: Received disconnect from 121.130.111.133 port 58089:11: Bye Bye [preauth] Jan 9 15:29:02 host sshd[13637]: Disconnected from 121.130.111.133 port 58089 [preauth] Jan 9 15:29:08 host sshd[13687]: User root from 51.89.166.204 not allowed because not listed in AllowUsers Jan 9 15:29:08 host sshd[13687]: input_userauth_request: invalid user root [preauth] Jan 9 15:29:08 host unix_chkpwd[13695]: password check failed for user (root) Jan 9 15:29:08 host sshd[13687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.166.204 user=root Jan 9 15:29:08 host sshd[13687]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:29:10 host sshd[13687]: Failed password for invalid user root from 51.89.166.204 port 51236 ssh2 Jan 9 15:29:11 host sshd[13687]: Received disconnect from 51.89.166.204 port 51236:11: Bye Bye [preauth] Jan 9 15:29:11 host sshd[13687]: Disconnected from 51.89.166.204 port 51236 [preauth] Jan 9 15:29:37 host sshd[13784]: User root from 160.120.247.113 not allowed because not listed in AllowUsers Jan 9 15:29:37 host sshd[13784]: input_userauth_request: invalid user root [preauth] Jan 9 15:29:37 host unix_chkpwd[13787]: password check failed for user (root) Jan 9 15:29:37 host sshd[13784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.120.247.113 user=root Jan 9 15:29:37 host sshd[13784]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:29:39 host sshd[13784]: Failed password for invalid user root from 160.120.247.113 port 59302 ssh2 Jan 9 15:29:39 host sshd[13784]: Received disconnect from 160.120.247.113 port 59302:11: Bye Bye [preauth] Jan 9 15:29:39 host sshd[13784]: Disconnected from 160.120.247.113 port 59302 [preauth] Jan 9 15:30:11 host sshd[13912]: User root from 157.245.154.129 not allowed because not listed in AllowUsers Jan 9 15:30:11 host sshd[13912]: input_userauth_request: invalid user root [preauth] Jan 9 15:30:11 host unix_chkpwd[13914]: password check failed for user (root) Jan 9 15:30:11 host sshd[13912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.154.129 user=root Jan 9 15:30:11 host sshd[13912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:30:13 host sshd[13912]: Failed password for invalid user root from 157.245.154.129 port 52956 ssh2 Jan 9 15:30:13 host sshd[13912]: Received disconnect from 157.245.154.129 port 52956:11: Bye Bye [preauth] Jan 9 15:30:13 host sshd[13912]: Disconnected from 157.245.154.129 port 52956 [preauth] Jan 9 15:30:40 host sshd[14021]: User root from 189.39.112.93 not allowed because not listed in AllowUsers Jan 9 15:30:40 host sshd[14021]: input_userauth_request: invalid user root [preauth] Jan 9 15:30:40 host unix_chkpwd[14026]: password check failed for user (root) Jan 9 15:30:40 host sshd[14021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.39.112.93 user=root Jan 9 15:30:40 host sshd[14021]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 15:30:42 host sshd[14021]: Failed password for invalid user root from 189.39.112.93 port 46266 ssh2 Jan 9 15:30:43 host sshd[14021]: Received disconnect from 189.39.112.93 port 46266:11: Bye Bye [preauth] Jan 9 15:30:43 host sshd[14021]: Disconnected from 189.39.112.93 port 46266 [preauth] Jan 9 15:54:15 host sshd[17497]: Invalid user steve from 107.189.30.59 port 38336 Jan 9 15:54:15 host sshd[17497]: input_userauth_request: invalid user steve [preauth] Jan 9 15:54:15 host sshd[17497]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:54:15 host sshd[17497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 9 15:54:17 host sshd[17497]: Failed password for invalid user steve from 107.189.30.59 port 38336 ssh2 Jan 9 15:54:18 host sshd[17497]: Connection closed by 107.189.30.59 port 38336 [preauth] Jan 9 15:58:11 host sshd[18124]: Invalid user joshua from 209.141.56.48 port 35768 Jan 9 15:58:11 host sshd[18124]: input_userauth_request: invalid user joshua [preauth] Jan 9 15:58:11 host sshd[18124]: pam_unix(sshd:auth): check pass; user unknown Jan 9 15:58:11 host sshd[18124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 9 15:58:13 host sshd[18124]: Failed password for invalid user joshua from 209.141.56.48 port 35768 ssh2 Jan 9 15:58:13 host sshd[18124]: Connection closed by 209.141.56.48 port 35768 [preauth] Jan 9 16:08:32 host sshd[19747]: Invalid user pi from 82.66.59.170 port 55971 Jan 9 16:08:32 host sshd[19747]: input_userauth_request: invalid user pi [preauth] Jan 9 16:08:33 host sshd[19747]: pam_unix(sshd:auth): check pass; user unknown Jan 9 16:08:33 host sshd[19747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.66.59.170 Jan 9 16:08:33 host sshd[19749]: Invalid user pi from 82.66.59.170 port 55972 Jan 9 16:08:33 host sshd[19749]: input_userauth_request: invalid user pi [preauth] Jan 9 16:08:34 host sshd[19749]: pam_unix(sshd:auth): check pass; user unknown Jan 9 16:08:34 host sshd[19749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.66.59.170 Jan 9 16:08:35 host sshd[19747]: Failed password for invalid user pi from 82.66.59.170 port 55971 ssh2 Jan 9 16:08:35 host sshd[19747]: Connection closed by 82.66.59.170 port 55971 [preauth] Jan 9 16:08:36 host sshd[19749]: Failed password for invalid user pi from 82.66.59.170 port 55972 ssh2 Jan 9 16:08:36 host sshd[19749]: Connection closed by 82.66.59.170 port 55972 [preauth] Jan 9 16:10:27 host sshd[20019]: Invalid user deploy from 173.212.225.62 port 57428 Jan 9 16:10:27 host sshd[20019]: input_userauth_request: invalid user deploy [preauth] Jan 9 16:10:28 host sshd[20019]: pam_unix(sshd:auth): check pass; user unknown Jan 9 16:10:28 host sshd[20019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 9 16:10:29 host sshd[20019]: Failed password for invalid user deploy from 173.212.225.62 port 57428 ssh2 Jan 9 16:10:30 host sshd[20019]: Received disconnect from 173.212.225.62 port 57428:11: Bye Bye [preauth] Jan 9 16:10:30 host sshd[20019]: Disconnected from 173.212.225.62 port 57428 [preauth] Jan 9 16:18:36 host sshd[21327]: User root from 167.172.98.89 not allowed because not listed in AllowUsers Jan 9 16:18:36 host sshd[21327]: input_userauth_request: invalid user root [preauth] Jan 9 16:18:37 host unix_chkpwd[21331]: password check failed for user (root) Jan 9 16:18:37 host sshd[21327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.89 user=root Jan 9 16:18:37 host sshd[21327]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 16:18:38 host sshd[21327]: Failed password for invalid user root from 167.172.98.89 port 41625 ssh2 Jan 9 16:18:38 host sshd[21327]: Received disconnect from 167.172.98.89 port 41625:11: Bye Bye [preauth] Jan 9 16:18:38 host sshd[21327]: Disconnected from 167.172.98.89 port 41625 [preauth] Jan 9 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 16:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=phmetals user-2=kottayamcalldriv user-3=palco123 user-4=gifterman user-5=mrsclean user-6=wwwnexidigital user-7=wwwevmhonda user-8=bonifacegroup user-9=straightcurve user-10=wwwletsstalkfood user-11=shalinijames user-12=wwwtestugo user-13=vfmassets user-14=pmcresources user-15=disposeat user-16=remysagr user-17=wwwkmaorg user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 16:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4JIyHlVVOcGzkAdw.~ Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4JIyHlVVOcGzkAdw.~' Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4JIyHlVVOcGzkAdw.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 16:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 16:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 16:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 16:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 16:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 16:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 16:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 16:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 16:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 16:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 16:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 16:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 16:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 16:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 16:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 16:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 16:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 16:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 16:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 16:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 16:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 16:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 16:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 16:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 16:24:32 host sshd[22364]: Did not receive identification string from 167.71.166.243 port 36172 Jan 9 16:24:33 host sshd[22362]: User root from 167.172.98.89 not allowed because not listed in AllowUsers Jan 9 16:24:33 host sshd[22362]: input_userauth_request: invalid user root [preauth] Jan 9 16:24:33 host unix_chkpwd[22368]: password check failed for user (root) Jan 9 16:24:33 host sshd[22362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.89 user=root Jan 9 16:24:33 host sshd[22362]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 16:24:35 host sshd[22362]: Failed password for invalid user root from 167.172.98.89 port 41578 ssh2 Jan 9 16:32:12 host sshd[23420]: User root from 170.253.42.196 not allowed because not listed in AllowUsers Jan 9 16:32:12 host sshd[23420]: input_userauth_request: invalid user root [preauth] Jan 9 16:32:12 host unix_chkpwd[23423]: password check failed for user (root) Jan 9 16:32:12 host sshd[23420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.253.42.196 user=root Jan 9 16:32:12 host sshd[23420]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 16:32:14 host sshd[23420]: Failed password for invalid user root from 170.253.42.196 port 54098 ssh2 Jan 9 16:32:14 host sshd[23420]: Received disconnect from 170.253.42.196 port 54098:11: Bye Bye [preauth] Jan 9 16:32:14 host sshd[23420]: Disconnected from 170.253.42.196 port 54098 [preauth] Jan 9 16:34:00 host sshd[23623]: User root from 128.199.173.197 not allowed because not listed in AllowUsers Jan 9 16:34:00 host sshd[23623]: input_userauth_request: invalid user root [preauth] Jan 9 16:34:00 host unix_chkpwd[23625]: password check failed for user (root) Jan 9 16:34:00 host sshd[23623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.173.197 user=root Jan 9 16:34:00 host sshd[23623]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 16:34:03 host sshd[23623]: Failed password for invalid user root from 128.199.173.197 port 35301 ssh2 Jan 9 16:34:03 host sshd[23623]: Received disconnect from 128.199.173.197 port 35301:11: Bye Bye [preauth] Jan 9 16:34:03 host sshd[23623]: Disconnected from 128.199.173.197 port 35301 [preauth] Jan 9 16:34:33 host sshd[23694]: Invalid user ang from 189.224.121.93 port 44352 Jan 9 16:34:33 host sshd[23694]: input_userauth_request: invalid user ang [preauth] Jan 9 16:34:33 host sshd[23694]: pam_unix(sshd:auth): check pass; user unknown Jan 9 16:34:33 host sshd[23694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.224.121.93 Jan 9 16:34:35 host sshd[23694]: Failed password for invalid user ang from 189.224.121.93 port 44352 ssh2 Jan 9 16:34:35 host sshd[23694]: Received disconnect from 189.224.121.93 port 44352:11: Bye Bye [preauth] Jan 9 16:34:35 host sshd[23694]: Disconnected from 189.224.121.93 port 44352 [preauth] Jan 9 16:37:36 host sshd[24197]: User root from 170.253.42.196 not allowed because not listed in AllowUsers Jan 9 16:37:36 host sshd[24197]: input_userauth_request: invalid user root [preauth] Jan 9 16:37:36 host unix_chkpwd[24200]: password check failed for user (root) Jan 9 16:37:36 host sshd[24197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.253.42.196 user=root Jan 9 16:37:36 host sshd[24197]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 16:37:39 host sshd[24197]: Failed password for invalid user root from 170.253.42.196 port 34722 ssh2 Jan 9 16:37:39 host sshd[24197]: Received disconnect from 170.253.42.196 port 34722:11: Bye Bye [preauth] Jan 9 16:37:39 host sshd[24197]: Disconnected from 170.253.42.196 port 34722 [preauth] Jan 9 16:38:07 host sshd[24297]: Invalid user worinima from 128.199.173.197 port 57492 Jan 9 16:38:07 host sshd[24297]: input_userauth_request: invalid user worinima [preauth] Jan 9 16:38:07 host sshd[24297]: pam_unix(sshd:auth): check pass; user unknown Jan 9 16:38:07 host sshd[24297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.173.197 Jan 9 16:38:09 host sshd[24297]: Failed password for invalid user worinima from 128.199.173.197 port 57492 ssh2 Jan 9 16:38:09 host sshd[24297]: Received disconnect from 128.199.173.197 port 57492:11: Bye Bye [preauth] Jan 9 16:38:09 host sshd[24297]: Disconnected from 128.199.173.197 port 57492 [preauth] Jan 9 16:38:39 host sshd[24405]: Invalid user br from 194.110.203.109 port 55028 Jan 9 16:38:39 host sshd[24405]: input_userauth_request: invalid user br [preauth] Jan 9 16:38:39 host sshd[24405]: pam_unix(sshd:auth): check pass; user unknown Jan 9 16:38:39 host sshd[24405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 16:38:41 host sshd[24405]: Failed password for invalid user br from 194.110.203.109 port 55028 ssh2 Jan 9 16:38:44 host sshd[24405]: pam_unix(sshd:auth): check pass; user unknown Jan 9 16:38:46 host sshd[24405]: Failed password for invalid user br from 194.110.203.109 port 55028 ssh2 Jan 9 16:38:49 host sshd[24405]: pam_unix(sshd:auth): check pass; user unknown Jan 9 16:38:51 host sshd[24405]: Failed password for invalid user br from 194.110.203.109 port 55028 ssh2 Jan 9 16:38:54 host sshd[24405]: Connection closed by 194.110.203.109 port 55028 [preauth] Jan 9 16:38:54 host sshd[24405]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 16:39:00 host sshd[24433]: User root from 189.224.121.93 not allowed because not listed in AllowUsers Jan 9 16:39:00 host sshd[24433]: input_userauth_request: invalid user root [preauth] Jan 9 16:39:00 host unix_chkpwd[24437]: password check failed for user (root) Jan 9 16:39:00 host sshd[24433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.224.121.93 user=root Jan 9 16:39:00 host sshd[24433]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 16:39:01 host sshd[24438]: Invalid user joshua from 209.141.56.48 port 34670 Jan 9 16:39:01 host sshd[24438]: input_userauth_request: invalid user joshua [preauth] Jan 9 16:39:01 host sshd[24438]: pam_unix(sshd:auth): check pass; user unknown Jan 9 16:39:01 host sshd[24438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 9 16:39:02 host sshd[24433]: Failed password for invalid user root from 189.224.121.93 port 40473 ssh2 Jan 9 16:39:03 host sshd[24433]: Received disconnect from 189.224.121.93 port 40473:11: Bye Bye [preauth] Jan 9 16:39:03 host sshd[24433]: Disconnected from 189.224.121.93 port 40473 [preauth] Jan 9 16:39:03 host sshd[24438]: Failed password for invalid user joshua from 209.141.56.48 port 34670 ssh2 Jan 9 16:39:03 host sshd[24438]: Connection closed by 209.141.56.48 port 34670 [preauth] Jan 9 17:05:12 host sshd[28143]: Invalid user joshua from 209.141.56.48 port 53566 Jan 9 17:05:12 host sshd[28143]: input_userauth_request: invalid user joshua [preauth] Jan 9 17:05:12 host sshd[28143]: pam_unix(sshd:auth): check pass; user unknown Jan 9 17:05:12 host sshd[28143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 9 17:05:14 host sshd[28143]: Failed password for invalid user joshua from 209.141.56.48 port 53566 ssh2 Jan 9 17:05:14 host sshd[28143]: Connection closed by 209.141.56.48 port 53566 [preauth] Jan 9 17:07:29 host sshd[28393]: Invalid user joshua from 209.141.56.48 port 57196 Jan 9 17:07:29 host sshd[28393]: input_userauth_request: invalid user joshua [preauth] Jan 9 17:07:29 host sshd[28393]: pam_unix(sshd:auth): check pass; user unknown Jan 9 17:07:29 host sshd[28393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 9 17:07:31 host sshd[28393]: Failed password for invalid user joshua from 209.141.56.48 port 57196 ssh2 Jan 9 17:15:37 host sshd[29563]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 9 17:15:37 host sshd[29563]: input_userauth_request: invalid user root [preauth] Jan 9 17:15:37 host unix_chkpwd[29566]: password check failed for user (root) Jan 9 17:15:37 host sshd[29563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 9 17:15:37 host sshd[29563]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 17:15:39 host sshd[29563]: Failed password for invalid user root from 194.169.175.102 port 63660 ssh2 Jan 9 17:15:40 host sshd[29563]: Received disconnect from 194.169.175.102 port 63660:11: Client disconnecting normally [preauth] Jan 9 17:15:40 host sshd[29563]: Disconnected from 194.169.175.102 port 63660 [preauth] Jan 9 17:20:55 host sshd[30276]: User root from 64.225.25.59 not allowed because not listed in AllowUsers Jan 9 17:20:55 host sshd[30276]: input_userauth_request: invalid user root [preauth] Jan 9 17:20:55 host unix_chkpwd[30279]: password check failed for user (root) Jan 9 17:20:55 host sshd[30276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.25.59 user=root Jan 9 17:20:55 host sshd[30276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 17:20:57 host sshd[30276]: Failed password for invalid user root from 64.225.25.59 port 43286 ssh2 Jan 9 17:20:57 host sshd[30276]: Received disconnect from 64.225.25.59 port 43286:11: Bye Bye [preauth] Jan 9 17:20:57 host sshd[30276]: Disconnected from 64.225.25.59 port 43286 [preauth] Jan 9 17:21:44 host sshd[30369]: User root from 210.105.193.6 not allowed because not listed in AllowUsers Jan 9 17:21:44 host sshd[30369]: input_userauth_request: invalid user root [preauth] Jan 9 17:21:44 host unix_chkpwd[30378]: password check failed for user (root) Jan 9 17:21:44 host sshd[30369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.105.193.6 user=root Jan 9 17:21:44 host sshd[30369]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 17:21:46 host sshd[30369]: Failed password for invalid user root from 210.105.193.6 port 43610 ssh2 Jan 9 17:21:47 host sshd[30369]: Received disconnect from 210.105.193.6 port 43610:11: Bye Bye [preauth] Jan 9 17:21:47 host sshd[30369]: Disconnected from 210.105.193.6 port 43610 [preauth] Jan 9 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 17:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=bonifacegroup user-4=wwwevmhonda user-5=wwwnexidigital user-6=mrsclean user-7=gifterman user-8=palco123 user-9=phmetals user-10=kottayamcalldriv user-11=woodpeck user-12=wwwkapin user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=wwwpmcresource user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 17:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XmfFH2VYBjeW0oEc.~ Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XmfFH2VYBjeW0oEc.~' Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XmfFH2VYBjeW0oEc.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 17:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 17:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 17:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 17:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 17:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 17:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 17:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 17:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 17:22:10 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 17:22:14 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 17:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 17:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 17:22:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 17:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 17:22:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 17:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 17:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 17:22:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 17:22:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 17:22:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 17:22:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 17:22:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 17:22:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 17:22:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 17:22:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 17:22:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 17:22:33 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 17:22:37 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 17:23:59 host sshd[30802]: User root from 40.70.0.187 not allowed because not listed in AllowUsers Jan 9 17:23:59 host sshd[30802]: input_userauth_request: invalid user root [preauth] Jan 9 17:23:59 host unix_chkpwd[30805]: password check failed for user (root) Jan 9 17:23:59 host sshd[30802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.70.0.187 user=root Jan 9 17:23:59 host sshd[30802]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 17:24:01 host sshd[30802]: Failed password for invalid user root from 40.70.0.187 port 54938 ssh2 Jan 9 17:24:02 host sshd[30802]: Received disconnect from 40.70.0.187 port 54938:11: Bye Bye [preauth] Jan 9 17:24:02 host sshd[30802]: Disconnected from 40.70.0.187 port 54938 [preauth] Jan 9 17:24:17 host sshd[30832]: Invalid user deploy from 173.212.225.62 port 46458 Jan 9 17:24:17 host sshd[30832]: input_userauth_request: invalid user deploy [preauth] Jan 9 17:24:17 host sshd[30832]: pam_unix(sshd:auth): check pass; user unknown Jan 9 17:24:17 host sshd[30832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 9 17:24:19 host sshd[30832]: Failed password for invalid user deploy from 173.212.225.62 port 46458 ssh2 Jan 9 17:24:19 host sshd[30832]: Received disconnect from 173.212.225.62 port 46458:11: Bye Bye [preauth] Jan 9 17:24:19 host sshd[30832]: Disconnected from 173.212.225.62 port 46458 [preauth] Jan 9 17:24:20 host sshd[30839]: Did not receive identification string from 167.71.166.243 port 45668 Jan 9 17:26:51 host sshd[31246]: Invalid user woainimen from 40.70.0.187 port 46118 Jan 9 17:26:51 host sshd[31246]: input_userauth_request: invalid user woainimen [preauth] Jan 9 17:26:51 host sshd[31246]: pam_unix(sshd:auth): check pass; user unknown Jan 9 17:26:51 host sshd[31246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.70.0.187 Jan 9 17:26:52 host sshd[31249]: User root from 64.225.25.59 not allowed because not listed in AllowUsers Jan 9 17:26:52 host sshd[31249]: input_userauth_request: invalid user root [preauth] Jan 9 17:26:52 host unix_chkpwd[31252]: password check failed for user (root) Jan 9 17:26:52 host sshd[31249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.25.59 user=root Jan 9 17:26:52 host sshd[31249]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 17:26:53 host sshd[31246]: Failed password for invalid user woainimen from 40.70.0.187 port 46118 ssh2 Jan 9 17:26:53 host sshd[31246]: Received disconnect from 40.70.0.187 port 46118:11: Bye Bye [preauth] Jan 9 17:26:53 host sshd[31246]: Disconnected from 40.70.0.187 port 46118 [preauth] Jan 9 17:26:54 host sshd[31249]: Failed password for invalid user root from 64.225.25.59 port 41710 ssh2 Jan 9 17:26:54 host sshd[31249]: Received disconnect from 64.225.25.59 port 41710:11: Bye Bye [preauth] Jan 9 17:26:54 host sshd[31249]: Disconnected from 64.225.25.59 port 41710 [preauth] Jan 9 17:27:11 host sshd[31357]: Connection closed by 194.180.48.37 port 56446 [preauth] Jan 9 17:29:07 host sshd[31580]: Invalid user buchaqian from 210.105.193.6 port 46014 Jan 9 17:29:07 host sshd[31580]: input_userauth_request: invalid user buchaqian [preauth] Jan 9 17:29:07 host sshd[31580]: pam_unix(sshd:auth): check pass; user unknown Jan 9 17:29:07 host sshd[31580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.105.193.6 Jan 9 17:29:09 host sshd[31580]: Failed password for invalid user buchaqian from 210.105.193.6 port 46014 ssh2 Jan 9 17:29:09 host sshd[31580]: Received disconnect from 210.105.193.6 port 46014:11: Bye Bye [preauth] Jan 9 17:29:09 host sshd[31580]: Disconnected from 210.105.193.6 port 46014 [preauth] Jan 9 17:36:45 host sshd[32706]: Connection closed by 167.71.166.243 port 55934 [preauth] Jan 9 17:58:55 host sshd[3261]: Invalid user admin from 176.111.173.164 port 56678 Jan 9 17:58:55 host sshd[3261]: input_userauth_request: invalid user admin [preauth] Jan 9 17:58:55 host sshd[3261]: pam_unix(sshd:auth): check pass; user unknown Jan 9 17:58:55 host sshd[3261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.111.173.164 Jan 9 17:58:56 host sshd[3261]: Failed password for invalid user admin from 176.111.173.164 port 56678 ssh2 Jan 9 17:58:59 host sshd[3261]: pam_unix(sshd:auth): check pass; user unknown Jan 9 17:59:01 host sshd[3261]: Failed password for invalid user admin from 176.111.173.164 port 56678 ssh2 Jan 9 17:59:04 host sshd[3261]: pam_unix(sshd:auth): check pass; user unknown Jan 9 17:59:06 host sshd[3261]: Failed password for invalid user admin from 176.111.173.164 port 56678 ssh2 Jan 9 17:59:10 host sshd[3261]: pam_unix(sshd:auth): check pass; user unknown Jan 9 17:59:11 host sshd[3261]: Failed password for invalid user admin from 176.111.173.164 port 56678 ssh2 Jan 9 18:09:34 host sshd[4884]: Connection closed by 172.105.128.12 port 26414 [preauth] Jan 9 18:09:35 host sshd[4887]: Connection closed by 172.105.128.12 port 26426 [preauth] Jan 9 18:09:38 host sshd[4892]: Connection closed by 172.105.128.12 port 46682 [preauth] Jan 9 18:11:56 host sshd[5211]: User root from 177.182.221.76 not allowed because not listed in AllowUsers Jan 9 18:11:56 host sshd[5211]: input_userauth_request: invalid user root [preauth] Jan 9 18:11:56 host unix_chkpwd[5215]: password check failed for user (root) Jan 9 18:11:56 host sshd[5211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.182.221.76 user=root Jan 9 18:11:56 host sshd[5211]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 18:11:58 host sshd[5211]: Failed password for invalid user root from 177.182.221.76 port 40668 ssh2 Jan 9 18:11:58 host sshd[5211]: Received disconnect from 177.182.221.76 port 40668:11: Bye Bye [preauth] Jan 9 18:11:58 host sshd[5211]: Disconnected from 177.182.221.76 port 40668 [preauth] Jan 9 18:12:08 host sshd[5240]: Invalid user jiushiaini from 175.207.13.22 port 39696 Jan 9 18:12:08 host sshd[5240]: input_userauth_request: invalid user jiushiaini [preauth] Jan 9 18:12:08 host sshd[5240]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:12:08 host sshd[5240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.22 Jan 9 18:12:10 host sshd[5240]: Failed password for invalid user jiushiaini from 175.207.13.22 port 39696 ssh2 Jan 9 18:12:10 host sshd[5240]: Received disconnect from 175.207.13.22 port 39696:11: Bye Bye [preauth] Jan 9 18:12:10 host sshd[5240]: Disconnected from 175.207.13.22 port 39696 [preauth] Jan 9 18:13:12 host sshd[5385]: Invalid user baishikele from 103.100.217.47 port 59082 Jan 9 18:13:12 host sshd[5385]: input_userauth_request: invalid user baishikele [preauth] Jan 9 18:13:12 host sshd[5385]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:13:12 host sshd[5385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.217.47 Jan 9 18:13:13 host sshd[5385]: Failed password for invalid user baishikele from 103.100.217.47 port 59082 ssh2 Jan 9 18:13:13 host sshd[5385]: Received disconnect from 103.100.217.47 port 59082:11: Bye Bye [preauth] Jan 9 18:13:13 host sshd[5385]: Disconnected from 103.100.217.47 port 59082 [preauth] Jan 9 18:13:29 host sshd[5422]: User root from 147.182.224.240 not allowed because not listed in AllowUsers Jan 9 18:13:29 host sshd[5422]: input_userauth_request: invalid user root [preauth] Jan 9 18:13:29 host unix_chkpwd[5499]: password check failed for user (root) Jan 9 18:13:29 host sshd[5422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.224.240 user=root Jan 9 18:13:29 host sshd[5422]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 18:13:31 host sshd[5422]: Failed password for invalid user root from 147.182.224.240 port 53952 ssh2 Jan 9 18:13:31 host sshd[5422]: Received disconnect from 147.182.224.240 port 53952:11: Bye Bye [preauth] Jan 9 18:13:31 host sshd[5422]: Disconnected from 147.182.224.240 port 53952 [preauth] Jan 9 18:15:23 host sshd[5833]: User root from 178.47.41.254 not allowed because not listed in AllowUsers Jan 9 18:15:23 host sshd[5833]: input_userauth_request: invalid user root [preauth] Jan 9 18:15:23 host unix_chkpwd[5836]: password check failed for user (root) Jan 9 18:15:23 host sshd[5833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.47.41.254 user=root Jan 9 18:15:23 host sshd[5833]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 18:15:25 host sshd[5833]: Failed password for invalid user root from 178.47.41.254 port 36392 ssh2 Jan 9 18:15:25 host sshd[5833]: Received disconnect from 178.47.41.254 port 36392:11: Bye Bye [preauth] Jan 9 18:15:25 host sshd[5833]: Disconnected from 178.47.41.254 port 36392 [preauth] Jan 9 18:16:00 host sshd[5937]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 9 18:16:00 host sshd[5937]: input_userauth_request: invalid user root [preauth] Jan 9 18:16:01 host unix_chkpwd[5940]: password check failed for user (root) Jan 9 18:16:01 host sshd[5937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 9 18:16:01 host sshd[5937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 18:16:03 host sshd[5937]: Failed password for invalid user root from 195.226.194.242 port 16430 ssh2 Jan 9 18:16:03 host sshd[5937]: Received disconnect from 195.226.194.242 port 16430:11: Bye Bye [preauth] Jan 9 18:16:03 host sshd[5937]: Disconnected from 195.226.194.242 port 16430 [preauth] Jan 9 18:16:40 host sshd[6033]: Invalid user nihaoya from 103.100.217.47 port 40010 Jan 9 18:16:40 host sshd[6033]: input_userauth_request: invalid user nihaoya [preauth] Jan 9 18:16:40 host sshd[6033]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:16:40 host sshd[6033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.217.47 Jan 9 18:16:42 host sshd[6033]: Failed password for invalid user nihaoya from 103.100.217.47 port 40010 ssh2 Jan 9 18:16:42 host sshd[6033]: Received disconnect from 103.100.217.47 port 40010:11: Bye Bye [preauth] Jan 9 18:16:42 host sshd[6033]: Disconnected from 103.100.217.47 port 40010 [preauth] Jan 9 18:16:57 host sshd[6069]: Invalid user wangliang from 147.182.224.240 port 54860 Jan 9 18:16:57 host sshd[6069]: input_userauth_request: invalid user wangliang [preauth] Jan 9 18:16:57 host sshd[6069]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:16:57 host sshd[6069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.224.240 Jan 9 18:17:00 host sshd[6069]: Failed password for invalid user wangliang from 147.182.224.240 port 54860 ssh2 Jan 9 18:17:00 host sshd[6069]: Received disconnect from 147.182.224.240 port 54860:11: Bye Bye [preauth] Jan 9 18:17:00 host sshd[6069]: Disconnected from 147.182.224.240 port 54860 [preauth] Jan 9 18:17:10 host sshd[6124]: User root from 175.207.13.22 not allowed because not listed in AllowUsers Jan 9 18:17:10 host sshd[6124]: input_userauth_request: invalid user root [preauth] Jan 9 18:17:10 host unix_chkpwd[6131]: password check failed for user (root) Jan 9 18:17:10 host sshd[6124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.22 user=root Jan 9 18:17:10 host sshd[6124]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 18:17:12 host sshd[6124]: Failed password for invalid user root from 175.207.13.22 port 58840 ssh2 Jan 9 18:17:13 host sshd[6124]: Received disconnect from 175.207.13.22 port 58840:11: Bye Bye [preauth] Jan 9 18:17:13 host sshd[6124]: Disconnected from 175.207.13.22 port 58840 [preauth] Jan 9 18:17:16 host sshd[6166]: Invalid user zhangyi from 178.47.41.254 port 50425 Jan 9 18:17:16 host sshd[6166]: input_userauth_request: invalid user zhangyi [preauth] Jan 9 18:17:16 host sshd[6166]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:17:16 host sshd[6166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.47.41.254 Jan 9 18:17:18 host sshd[6166]: Failed password for invalid user zhangyi from 178.47.41.254 port 50425 ssh2 Jan 9 18:17:18 host sshd[6166]: Received disconnect from 178.47.41.254 port 50425:11: Bye Bye [preauth] Jan 9 18:17:18 host sshd[6166]: Disconnected from 178.47.41.254 port 50425 [preauth] Jan 9 18:17:25 host sshd[6213]: Invalid user jiajiayue from 107.170.118.81 port 44280 Jan 9 18:17:25 host sshd[6213]: input_userauth_request: invalid user jiajiayue [preauth] Jan 9 18:17:25 host sshd[6213]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:17:25 host sshd[6213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.118.81 Jan 9 18:17:27 host sshd[6213]: Failed password for invalid user jiajiayue from 107.170.118.81 port 44280 ssh2 Jan 9 18:17:27 host sshd[6213]: Received disconnect from 107.170.118.81 port 44280:11: Bye Bye [preauth] Jan 9 18:17:27 host sshd[6213]: Disconnected from 107.170.118.81 port 44280 [preauth] Jan 9 18:18:07 host sshd[6299]: User root from 177.182.221.76 not allowed because not listed in AllowUsers Jan 9 18:18:07 host sshd[6299]: input_userauth_request: invalid user root [preauth] Jan 9 18:18:07 host unix_chkpwd[6303]: password check failed for user (root) Jan 9 18:18:07 host sshd[6299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.182.221.76 user=root Jan 9 18:18:07 host sshd[6299]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 18:18:08 host sshd[6305]: User root from 103.100.217.47 not allowed because not listed in AllowUsers Jan 9 18:18:08 host sshd[6305]: input_userauth_request: invalid user root [preauth] Jan 9 18:18:08 host unix_chkpwd[6312]: password check failed for user (root) Jan 9 18:18:08 host sshd[6305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.217.47 user=root Jan 9 18:18:08 host sshd[6305]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 18:18:09 host sshd[6299]: Failed password for invalid user root from 177.182.221.76 port 37484 ssh2 Jan 9 18:18:10 host sshd[6305]: Failed password for invalid user root from 103.100.217.47 port 35214 ssh2 Jan 9 18:18:10 host sshd[6305]: Received disconnect from 103.100.217.47 port 35214:11: Bye Bye [preauth] Jan 9 18:18:10 host sshd[6305]: Disconnected from 103.100.217.47 port 35214 [preauth] Jan 9 18:20:12 host sshd[6610]: Invalid user baishikele from 107.170.118.81 port 53154 Jan 9 18:20:12 host sshd[6610]: input_userauth_request: invalid user baishikele [preauth] Jan 9 18:20:12 host sshd[6610]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:20:12 host sshd[6610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.118.81 Jan 9 18:20:13 host sshd[6610]: Failed password for invalid user baishikele from 107.170.118.81 port 53154 ssh2 Jan 9 18:20:13 host sshd[6610]: Received disconnect from 107.170.118.81 port 53154:11: Bye Bye [preauth] Jan 9 18:20:13 host sshd[6610]: Disconnected from 107.170.118.81 port 53154 [preauth] Jan 9 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 18:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=phmetals user-4=kottayamcalldriv user-5=palco123 user-6=gifterman user-7=straightcurve user-8=wwwletsstalkfood user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=wwwkapin user-16=woodpeck user-17=remysagr user-18=disposeat user-19=wwwkmaorg user-20=ugotscom user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 18:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WHng09KxGEHVTvbH.~ Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WHng09KxGEHVTvbH.~' Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WHng09KxGEHVTvbH.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 18:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 18:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 18:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 18:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 18:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 18:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 18:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 18:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 18:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 18:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 18:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 18:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 18:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 18:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 18:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 18:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 18:22:09 host sshd[7126]: Invalid user woaiwo from 107.170.118.81 port 53055 Jan 9 18:22:09 host sshd[7126]: input_userauth_request: invalid user woaiwo [preauth] Jan 9 18:22:09 host sshd[7126]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:22:09 host sshd[7126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.118.81 Jan 9 18:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 18:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 18:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 18:22:11 host sshd[7126]: Failed password for invalid user woaiwo from 107.170.118.81 port 53055 ssh2 Jan 9 18:22:12 host sshd[7126]: Received disconnect from 107.170.118.81 port 53055:11: Bye Bye [preauth] Jan 9 18:22:12 host sshd[7126]: Disconnected from 107.170.118.81 port 53055 [preauth] Jan 9 18:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 18:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 18:22:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 18:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 18:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 18:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 18:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 18:32:23 host sshd[8639]: Did not receive identification string from 172.104.210.105 port 56416 Jan 9 18:38:53 host sshd[9505]: Invalid user deploy from 173.212.225.62 port 35468 Jan 9 18:38:53 host sshd[9505]: input_userauth_request: invalid user deploy [preauth] Jan 9 18:38:53 host sshd[9505]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:38:53 host sshd[9505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 9 18:38:55 host sshd[9505]: Failed password for invalid user deploy from 173.212.225.62 port 35468 ssh2 Jan 9 18:38:56 host sshd[9505]: Received disconnect from 173.212.225.62 port 35468:11: Bye Bye [preauth] Jan 9 18:38:56 host sshd[9505]: Disconnected from 173.212.225.62 port 35468 [preauth] Jan 9 18:48:49 host sshd[10923]: Invalid user bs from 194.110.203.109 port 58702 Jan 9 18:48:49 host sshd[10923]: input_userauth_request: invalid user bs [preauth] Jan 9 18:48:49 host sshd[10923]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:48:49 host sshd[10923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 18:48:51 host sshd[10923]: Failed password for invalid user bs from 194.110.203.109 port 58702 ssh2 Jan 9 18:48:54 host sshd[10923]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:48:56 host sshd[10923]: Failed password for invalid user bs from 194.110.203.109 port 58702 ssh2 Jan 9 18:48:59 host sshd[10923]: pam_unix(sshd:auth): check pass; user unknown Jan 9 18:49:01 host sshd[10923]: Failed password for invalid user bs from 194.110.203.109 port 58702 ssh2 Jan 9 18:49:04 host sshd[10923]: Connection closed by 194.110.203.109 port 58702 [preauth] Jan 9 18:49:04 host sshd[10923]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 19:01:18 host sshd[12959]: User root from 103.111.23.22 not allowed because not listed in AllowUsers Jan 9 19:01:18 host sshd[12959]: input_userauth_request: invalid user root [preauth] Jan 9 19:01:18 host unix_chkpwd[12961]: password check failed for user (root) Jan 9 19:01:18 host sshd[12959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.111.23.22 user=root Jan 9 19:01:18 host sshd[12959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 19:01:19 host sshd[12959]: Failed password for invalid user root from 103.111.23.22 port 47486 ssh2 Jan 9 19:01:19 host sshd[12959]: Received disconnect from 103.111.23.22 port 47486:11: Bye Bye [preauth] Jan 9 19:01:19 host sshd[12959]: Disconnected from 103.111.23.22 port 47486 [preauth] Jan 9 19:02:17 host sshd[13058]: User root from 211.20.14.156 not allowed because not listed in AllowUsers Jan 9 19:02:17 host sshd[13058]: input_userauth_request: invalid user root [preauth] Jan 9 19:02:17 host unix_chkpwd[13061]: password check failed for user (root) Jan 9 19:02:17 host sshd[13058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.20.14.156 user=root Jan 9 19:02:17 host sshd[13058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 19:02:19 host sshd[13058]: Failed password for invalid user root from 211.20.14.156 port 43016 ssh2 Jan 9 19:02:19 host sshd[13058]: Received disconnect from 211.20.14.156 port 43016:11: Bye Bye [preauth] Jan 9 19:02:19 host sshd[13058]: Disconnected from 211.20.14.156 port 43016 [preauth] Jan 9 19:02:58 host sshd[13145]: Invalid user aaaaaa from 134.17.16.43 port 39174 Jan 9 19:02:58 host sshd[13145]: input_userauth_request: invalid user aaaaaa [preauth] Jan 9 19:02:58 host sshd[13145]: pam_unix(sshd:auth): check pass; user unknown Jan 9 19:02:58 host sshd[13145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.43 Jan 9 19:03:00 host sshd[13145]: Failed password for invalid user aaaaaa from 134.17.16.43 port 39174 ssh2 Jan 9 19:03:00 host sshd[13145]: Received disconnect from 134.17.16.43 port 39174:11: Bye Bye [preauth] Jan 9 19:03:00 host sshd[13145]: Disconnected from 134.17.16.43 port 39174 [preauth] Jan 9 19:03:52 host sshd[13253]: Invalid user baobao from 130.61.232.86 port 40552 Jan 9 19:03:52 host sshd[13253]: input_userauth_request: invalid user baobao [preauth] Jan 9 19:03:52 host sshd[13253]: pam_unix(sshd:auth): check pass; user unknown Jan 9 19:03:52 host sshd[13253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.232.86 Jan 9 19:03:54 host sshd[13253]: Failed password for invalid user baobao from 130.61.232.86 port 40552 ssh2 Jan 9 19:03:55 host sshd[13253]: Received disconnect from 130.61.232.86 port 40552:11: Bye Bye [preauth] Jan 9 19:03:55 host sshd[13253]: Disconnected from 130.61.232.86 port 40552 [preauth] Jan 9 19:04:39 host sshd[13349]: User root from 189.100.73.39 not allowed because not listed in AllowUsers Jan 9 19:04:39 host sshd[13349]: input_userauth_request: invalid user root [preauth] Jan 9 19:04:39 host unix_chkpwd[13353]: password check failed for user (root) Jan 9 19:04:39 host sshd[13349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.100.73.39 user=root Jan 9 19:04:39 host sshd[13349]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 19:04:41 host sshd[13349]: Failed password for invalid user root from 189.100.73.39 port 48674 ssh2 Jan 9 19:04:42 host sshd[13349]: Received disconnect from 189.100.73.39 port 48674:11: Bye Bye [preauth] Jan 9 19:04:42 host sshd[13349]: Disconnected from 189.100.73.39 port 48674 [preauth] Jan 9 19:05:02 host sshd[13377]: Invalid user o from 165.227.175.44 port 58114 Jan 9 19:05:02 host sshd[13377]: input_userauth_request: invalid user o [preauth] Jan 9 19:05:02 host sshd[13377]: pam_unix(sshd:auth): check pass; user unknown Jan 9 19:05:02 host sshd[13377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.175.44 Jan 9 19:05:03 host sshd[13377]: Failed password for invalid user o from 165.227.175.44 port 58114 ssh2 Jan 9 19:05:04 host sshd[13377]: Received disconnect from 165.227.175.44 port 58114:11: Bye Bye [preauth] Jan 9 19:05:04 host sshd[13377]: Disconnected from 165.227.175.44 port 58114 [preauth] Jan 9 19:05:13 host sshd[13414]: Invalid user bubuhu from 69.221.145.153 port 55232 Jan 9 19:05:13 host sshd[13414]: input_userauth_request: invalid user bubuhu [preauth] Jan 9 19:05:13 host sshd[13414]: pam_unix(sshd:auth): check pass; user unknown Jan 9 19:05:13 host sshd[13414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.221.145.153 Jan 9 19:05:15 host sshd[13414]: Failed password for invalid user bubuhu from 69.221.145.153 port 55232 ssh2 Jan 9 19:05:16 host sshd[13414]: Received disconnect from 69.221.145.153 port 55232:11: Bye Bye [preauth] Jan 9 19:05:16 host sshd[13414]: Disconnected from 69.221.145.153 port 55232 [preauth] Jan 9 19:06:38 host sshd[13582]: User root from 134.17.16.43 not allowed because not listed in AllowUsers Jan 9 19:06:38 host sshd[13582]: input_userauth_request: invalid user root [preauth] Jan 9 19:06:38 host unix_chkpwd[13585]: password check failed for user (root) Jan 9 19:06:38 host sshd[13582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.43 user=root Jan 9 19:06:38 host sshd[13582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 19:06:39 host sshd[13582]: Failed password for invalid user root from 134.17.16.43 port 39176 ssh2 Jan 9 19:06:40 host sshd[13582]: Received disconnect from 134.17.16.43 port 39176:11: Bye Bye [preauth] Jan 9 19:06:40 host sshd[13582]: Disconnected from 134.17.16.43 port 39176 [preauth] Jan 9 19:07:06 host sshd[13762]: User root from 43.154.162.245 not allowed because not listed in AllowUsers Jan 9 19:07:06 host sshd[13762]: input_userauth_request: invalid user root [preauth] Jan 9 19:07:06 host unix_chkpwd[13764]: password check failed for user (root) Jan 9 19:07:06 host sshd[13762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.162.245 user=root Jan 9 19:07:06 host sshd[13762]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 19:07:08 host sshd[13762]: Failed password for invalid user root from 43.154.162.245 port 47628 ssh2 Jan 9 19:07:08 host sshd[13762]: Received disconnect from 43.154.162.245 port 47628:11: Bye Bye [preauth] Jan 9 19:07:08 host sshd[13762]: Disconnected from 43.154.162.245 port 47628 [preauth] Jan 9 19:07:19 host sshd[13779]: Invalid user liushuai from 69.221.145.153 port 45400 Jan 9 19:07:19 host sshd[13779]: input_userauth_request: invalid user liushuai [preauth] Jan 9 19:07:19 host sshd[13779]: pam_unix(sshd:auth): check pass; user unknown Jan 9 19:07:19 host sshd[13779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.221.145.153 Jan 9 19:07:21 host sshd[13779]: Failed password for invalid user liushuai from 69.221.145.153 port 45400 ssh2 Jan 9 19:07:22 host sshd[13779]: Received disconnect from 69.221.145.153 port 45400:11: Bye Bye [preauth] Jan 9 19:07:22 host sshd[13779]: Disconnected from 69.221.145.153 port 45400 [preauth] Jan 9 19:07:43 host sshd[13842]: User root from 165.227.175.44 not allowed because not listed in AllowUsers Jan 9 19:07:43 host sshd[13842]: input_userauth_request: invalid user root [preauth] Jan 9 19:07:43 host unix_chkpwd[13846]: password check failed for user (root) Jan 9 19:07:43 host sshd[13842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.175.44 user=root Jan 9 19:07:43 host sshd[13842]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 19:07:44 host sshd[13842]: Failed password for invalid user root from 165.227.175.44 port 38596 ssh2 Jan 9 19:07:45 host sshd[13842]: Received disconnect from 165.227.175.44 port 38596:11: Bye Bye [preauth] Jan 9 19:07:45 host sshd[13842]: Disconnected from 165.227.175.44 port 38596 [preauth] Jan 9 19:08:00 host sshd[13899]: User root from 103.111.23.22 not allowed because not listed in AllowUsers Jan 9 19:08:00 host sshd[13899]: input_userauth_request: invalid user root [preauth] Jan 9 19:08:00 host unix_chkpwd[13901]: password check failed for user (root) Jan 9 19:08:00 host sshd[13899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.111.23.22 user=root Jan 9 19:08:00 host sshd[13899]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 19:08:02 host sshd[13910]: User root from 211.20.14.156 not allowed because not listed in AllowUsers Jan 9 19:08:02 host sshd[13910]: input_userauth_request: invalid user root [preauth] Jan 9 19:08:02 host unix_chkpwd[13920]: password check failed for user (root) Jan 9 19:08:02 host sshd[13910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.20.14.156 user=root Jan 9 19:08:02 host sshd[13910]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 19:08:02 host sshd[13899]: Failed password for invalid user root from 103.111.23.22 port 42900 ssh2 Jan 9 19:08:03 host sshd[13910]: Failed password for invalid user root from 211.20.14.156 port 37539 ssh2 Jan 9 19:08:03 host sshd[13910]: Received disconnect from 211.20.14.156 port 37539:11: Bye Bye [preauth] Jan 9 19:08:03 host sshd[13910]: Disconnected from 211.20.14.156 port 37539 [preauth] Jan 9 19:08:34 host sshd[14037]: User root from 69.221.145.153 not allowed because not listed in AllowUsers Jan 9 19:08:34 host sshd[14037]: input_userauth_request: invalid user root [preauth] Jan 9 19:08:34 host unix_chkpwd[14040]: password check failed for user (root) Jan 9 19:08:34 host sshd[14037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.221.145.153 user=root Jan 9 19:08:34 host sshd[14037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 19:08:35 host sshd[14037]: Failed password for invalid user root from 69.221.145.153 port 55200 ssh2 Jan 9 19:08:35 host sshd[14037]: Received disconnect from 69.221.145.153 port 55200:11: Bye Bye [preauth] Jan 9 19:08:35 host sshd[14037]: Disconnected from 69.221.145.153 port 55200 [preauth] Jan 9 19:09:14 host sshd[14155]: Invalid user woshiren from 43.154.162.245 port 49878 Jan 9 19:09:14 host sshd[14155]: input_userauth_request: invalid user woshiren [preauth] Jan 9 19:09:14 host sshd[14155]: pam_unix(sshd:auth): check pass; user unknown Jan 9 19:09:14 host sshd[14155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.162.245 Jan 9 19:09:17 host sshd[14155]: Failed password for invalid user woshiren from 43.154.162.245 port 49878 ssh2 Jan 9 19:09:17 host sshd[14155]: Received disconnect from 43.154.162.245 port 49878:11: Bye Bye [preauth] Jan 9 19:09:17 host sshd[14155]: Disconnected from 43.154.162.245 port 49878 [preauth] Jan 9 19:10:40 host sshd[14370]: Invalid user chenming from 189.100.73.39 port 41061 Jan 9 19:10:40 host sshd[14370]: input_userauth_request: invalid user chenming [preauth] Jan 9 19:10:40 host sshd[14370]: pam_unix(sshd:auth): check pass; user unknown Jan 9 19:10:40 host sshd[14370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.100.73.39 Jan 9 19:10:42 host sshd[14370]: Failed password for invalid user chenming from 189.100.73.39 port 41061 ssh2 Jan 9 19:10:42 host sshd[14370]: Received disconnect from 189.100.73.39 port 41061:11: Bye Bye [preauth] Jan 9 19:10:42 host sshd[14370]: Disconnected from 189.100.73.39 port 41061 [preauth] Jan 9 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 19:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=cochintaxi user-11=wwwkaretakers user-12=mrsclean user-13=wwwnexidigital user-14=kottayamcalldriv user-15=phmetals user-16=gifterman user-17=palco123 user-18=straightcurve user-19=wwwletsstalkfood user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=wwwkapin user-27=woodpeck user-28=remysagr user-29=disposeat user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 19:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SnRuEnj6hP4mle9r.~ Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SnRuEnj6hP4mle9r.~' Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SnRuEnj6hP4mle9r.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 19:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 19:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 19:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 19:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 19:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 19:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 19:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 19:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 19:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 19:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 19:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 19:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 19:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 19:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 19:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 19:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 19:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 19:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 19:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 19:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 19:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 19:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 19:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 19:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 19:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 19:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 19:23:56 host sshd[16319]: Invalid user diag from 104.244.74.6 port 42752 Jan 9 19:23:56 host sshd[16319]: input_userauth_request: invalid user diag [preauth] Jan 9 19:23:56 host sshd[16319]: pam_unix(sshd:auth): check pass; user unknown Jan 9 19:23:56 host sshd[16319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 9 19:23:58 host sshd[16319]: Failed password for invalid user diag from 104.244.74.6 port 42752 ssh2 Jan 9 19:23:58 host sshd[16319]: Connection closed by 104.244.74.6 port 42752 [preauth] Jan 9 19:26:51 host sshd[16749]: Connection closed by 61.189.43.58 port 36158 [preauth] Jan 9 19:38:33 host sshd[18391]: Invalid user diag from 104.244.74.6 port 39144 Jan 9 19:38:33 host sshd[18391]: input_userauth_request: invalid user diag [preauth] Jan 9 19:38:33 host sshd[18391]: pam_unix(sshd:auth): check pass; user unknown Jan 9 19:38:33 host sshd[18391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 9 19:38:36 host sshd[18391]: Failed password for invalid user diag from 104.244.74.6 port 39144 ssh2 Jan 9 19:38:36 host sshd[18391]: Connection closed by 104.244.74.6 port 39144 [preauth] Jan 9 19:52:38 host sshd[21186]: Invalid user deploy from 173.212.225.62 port 52690 Jan 9 19:52:38 host sshd[21186]: input_userauth_request: invalid user deploy [preauth] Jan 9 19:52:38 host sshd[21186]: pam_unix(sshd:auth): check pass; user unknown Jan 9 19:52:38 host sshd[21186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 9 19:52:40 host sshd[21186]: Failed password for invalid user deploy from 173.212.225.62 port 52690 ssh2 Jan 9 19:52:40 host sshd[21186]: Received disconnect from 173.212.225.62 port 52690:11: Bye Bye [preauth] Jan 9 19:52:40 host sshd[21186]: Disconnected from 173.212.225.62 port 52690 [preauth] Jan 9 20:19:10 host sshd[25030]: Invalid user fengfeng from 222.24.63.126 port 55120 Jan 9 20:19:10 host sshd[25030]: input_userauth_request: invalid user fengfeng [preauth] Jan 9 20:19:10 host sshd[25030]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:19:10 host sshd[25030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.24.63.126 Jan 9 20:19:12 host sshd[25030]: Failed password for invalid user fengfeng from 222.24.63.126 port 55120 ssh2 Jan 9 20:19:12 host sshd[25030]: Received disconnect from 222.24.63.126 port 55120:11: Bye Bye [preauth] Jan 9 20:19:12 host sshd[25030]: Disconnected from 222.24.63.126 port 55120 [preauth] Jan 9 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 20:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwrmswll user-5=wwwresourcehunte user-6=keralaholi user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=gifterman user-19=palco123 user-20=wwwnexidigital user-21=mrsclean user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=wwwtestugo user-28=shalinijames user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 20:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ExaLkuBw1242nTWu.~ Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ExaLkuBw1242nTWu.~' Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ExaLkuBw1242nTWu.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 20:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 20:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 20:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 20:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 20:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 20:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 20:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 20:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 20:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 20:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 20:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 20:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 20:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 20:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 20:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 20:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 20:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 20:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 20:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 20:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 20:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 20:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 20:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 20:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 20:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 20:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 20:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 20:28:53 host sshd[27249]: Connection reset by 68.183.4.78 port 27057 [preauth] Jan 9 20:29:32 host sshd[27410]: User root from 198.199.86.89 not allowed because not listed in AllowUsers Jan 9 20:29:32 host sshd[27410]: input_userauth_request: invalid user root [preauth] Jan 9 20:29:32 host unix_chkpwd[27450]: password check failed for user (root) Jan 9 20:29:32 host sshd[27410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.86.89 user=root Jan 9 20:29:32 host sshd[27410]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 20:29:34 host sshd[27410]: Failed password for invalid user root from 198.199.86.89 port 45420 ssh2 Jan 9 20:29:34 host sshd[27410]: Received disconnect from 198.199.86.89 port 45420:11: Bye Bye [preauth] Jan 9 20:29:34 host sshd[27410]: Disconnected from 198.199.86.89 port 45420 [preauth] Jan 9 20:29:48 host sshd[27473]: Invalid user zhanglong from 161.35.112.95 port 52688 Jan 9 20:29:48 host sshd[27473]: input_userauth_request: invalid user zhanglong [preauth] Jan 9 20:29:48 host sshd[27473]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:29:48 host sshd[27473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.112.95 Jan 9 20:29:50 host sshd[27473]: Failed password for invalid user zhanglong from 161.35.112.95 port 52688 ssh2 Jan 9 20:29:50 host sshd[27473]: Received disconnect from 161.35.112.95 port 52688:11: Bye Bye [preauth] Jan 9 20:29:50 host sshd[27473]: Disconnected from 161.35.112.95 port 52688 [preauth] Jan 9 20:31:15 host sshd[27668]: User root from 176.57.89.37 not allowed because not listed in AllowUsers Jan 9 20:31:15 host sshd[27668]: input_userauth_request: invalid user root [preauth] Jan 9 20:31:15 host unix_chkpwd[27671]: password check failed for user (root) Jan 9 20:31:15 host sshd[27668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.57.89.37 user=root Jan 9 20:31:15 host sshd[27668]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 20:31:17 host sshd[27668]: Failed password for invalid user root from 176.57.89.37 port 60464 ssh2 Jan 9 20:31:17 host sshd[27668]: Received disconnect from 176.57.89.37 port 60464:11: Bye Bye [preauth] Jan 9 20:31:17 host sshd[27668]: Disconnected from 176.57.89.37 port 60464 [preauth] Jan 9 20:32:31 host sshd[27869]: Invalid user wangchen from 43.153.210.18 port 47880 Jan 9 20:32:31 host sshd[27869]: input_userauth_request: invalid user wangchen [preauth] Jan 9 20:32:31 host sshd[27869]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:32:31 host sshd[27869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.210.18 Jan 9 20:32:33 host sshd[27869]: Failed password for invalid user wangchen from 43.153.210.18 port 47880 ssh2 Jan 9 20:32:33 host sshd[27869]: Received disconnect from 43.153.210.18 port 47880:11: Bye Bye [preauth] Jan 9 20:32:33 host sshd[27869]: Disconnected from 43.153.210.18 port 47880 [preauth] Jan 9 20:32:45 host sshd[27890]: User root from 198.199.86.89 not allowed because not listed in AllowUsers Jan 9 20:32:45 host sshd[27890]: input_userauth_request: invalid user root [preauth] Jan 9 20:32:45 host unix_chkpwd[27893]: password check failed for user (root) Jan 9 20:32:45 host sshd[27890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.86.89 user=root Jan 9 20:32:45 host sshd[27890]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 20:32:47 host sshd[27890]: Failed password for invalid user root from 198.199.86.89 port 37304 ssh2 Jan 9 20:32:47 host sshd[27890]: Received disconnect from 198.199.86.89 port 37304:11: Bye Bye [preauth] Jan 9 20:32:47 host sshd[27890]: Disconnected from 198.199.86.89 port 37304 [preauth] Jan 9 20:33:36 host sshd[28025]: Invalid user wangfei from 161.35.112.95 port 38028 Jan 9 20:33:36 host sshd[28025]: input_userauth_request: invalid user wangfei [preauth] Jan 9 20:33:36 host sshd[28025]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:33:36 host sshd[28025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.112.95 Jan 9 20:33:39 host sshd[28025]: Failed password for invalid user wangfei from 161.35.112.95 port 38028 ssh2 Jan 9 20:33:39 host sshd[28025]: Received disconnect from 161.35.112.95 port 38028:11: Bye Bye [preauth] Jan 9 20:33:39 host sshd[28025]: Disconnected from 161.35.112.95 port 38028 [preauth] Jan 9 20:34:46 host sshd[28174]: User root from 161.35.112.95 not allowed because not listed in AllowUsers Jan 9 20:34:46 host sshd[28174]: input_userauth_request: invalid user root [preauth] Jan 9 20:34:46 host unix_chkpwd[28177]: password check failed for user (root) Jan 9 20:34:46 host sshd[28174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.112.95 user=root Jan 9 20:34:46 host sshd[28174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 20:34:48 host sshd[28174]: Failed password for invalid user root from 161.35.112.95 port 33570 ssh2 Jan 9 20:34:48 host sshd[28174]: Received disconnect from 161.35.112.95 port 33570:11: Bye Bye [preauth] Jan 9 20:34:48 host sshd[28174]: Disconnected from 161.35.112.95 port 33570 [preauth] Jan 9 20:35:00 host sshd[28327]: User root from 43.153.210.18 not allowed because not listed in AllowUsers Jan 9 20:35:00 host sshd[28327]: input_userauth_request: invalid user root [preauth] Jan 9 20:35:00 host unix_chkpwd[28329]: password check failed for user (root) Jan 9 20:35:00 host sshd[28327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.210.18 user=root Jan 9 20:35:00 host sshd[28327]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 20:35:02 host sshd[28327]: Failed password for invalid user root from 43.153.210.18 port 49028 ssh2 Jan 9 20:35:02 host sshd[28327]: Received disconnect from 43.153.210.18 port 49028:11: Bye Bye [preauth] Jan 9 20:35:02 host sshd[28327]: Disconnected from 43.153.210.18 port 49028 [preauth] Jan 9 20:35:31 host sshd[28453]: Invalid user sunyanzi from 176.57.89.37 port 42596 Jan 9 20:35:31 host sshd[28453]: input_userauth_request: invalid user sunyanzi [preauth] Jan 9 20:35:31 host sshd[28453]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:35:31 host sshd[28453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.57.89.37 Jan 9 20:35:33 host sshd[28453]: Failed password for invalid user sunyanzi from 176.57.89.37 port 42596 ssh2 Jan 9 20:35:33 host sshd[28453]: Received disconnect from 176.57.89.37 port 42596:11: Bye Bye [preauth] Jan 9 20:35:33 host sshd[28453]: Disconnected from 176.57.89.37 port 42596 [preauth] Jan 9 20:40:02 host sshd[29006]: Invalid user setup from 31.41.244.124 port 20844 Jan 9 20:40:02 host sshd[29006]: input_userauth_request: invalid user setup [preauth] Jan 9 20:40:02 host sshd[29006]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:40:02 host sshd[29006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 9 20:40:04 host sshd[29006]: Failed password for invalid user setup from 31.41.244.124 port 20844 ssh2 Jan 9 20:40:04 host sshd[29006]: Received disconnect from 31.41.244.124 port 20844:11: Client disconnecting normally [preauth] Jan 9 20:40:04 host sshd[29006]: Disconnected from 31.41.244.124 port 20844 [preauth] Jan 9 20:40:05 host sshd[29037]: Invalid user test from 31.41.244.124 port 25779 Jan 9 20:40:05 host sshd[29037]: input_userauth_request: invalid user test [preauth] Jan 9 20:40:05 host sshd[29037]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:40:05 host sshd[29037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 9 20:40:07 host sshd[29037]: Failed password for invalid user test from 31.41.244.124 port 25779 ssh2 Jan 9 20:40:07 host sshd[29037]: Received disconnect from 31.41.244.124 port 25779:11: Client disconnecting normally [preauth] Jan 9 20:40:07 host sshd[29037]: Disconnected from 31.41.244.124 port 25779 [preauth] Jan 9 20:40:08 host sshd[29046]: Invalid user user1 from 31.41.244.124 port 30881 Jan 9 20:40:08 host sshd[29046]: input_userauth_request: invalid user user1 [preauth] Jan 9 20:40:09 host sshd[29046]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:40:09 host sshd[29046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 9 20:40:11 host sshd[29046]: Failed password for invalid user user1 from 31.41.244.124 port 30881 ssh2 Jan 9 20:40:11 host sshd[29046]: Received disconnect from 31.41.244.124 port 30881:11: Client disconnecting normally [preauth] Jan 9 20:40:11 host sshd[29046]: Disconnected from 31.41.244.124 port 30881 [preauth] Jan 9 20:47:52 host sshd[30334]: Invalid user louis from 107.189.30.59 port 53028 Jan 9 20:47:52 host sshd[30334]: input_userauth_request: invalid user louis [preauth] Jan 9 20:47:52 host sshd[30334]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:47:52 host sshd[30334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 9 20:47:54 host sshd[30334]: Failed password for invalid user louis from 107.189.30.59 port 53028 ssh2 Jan 9 20:47:55 host sshd[30334]: Connection closed by 107.189.30.59 port 53028 [preauth] Jan 9 20:51:05 host sshd[30878]: Invalid user bt from 194.110.203.109 port 36798 Jan 9 20:51:05 host sshd[30878]: input_userauth_request: invalid user bt [preauth] Jan 9 20:51:05 host sshd[30878]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:51:05 host sshd[30878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 20:51:07 host sshd[30878]: Failed password for invalid user bt from 194.110.203.109 port 36798 ssh2 Jan 9 20:51:10 host sshd[30878]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:51:12 host sshd[30878]: Failed password for invalid user bt from 194.110.203.109 port 36798 ssh2 Jan 9 20:51:15 host sshd[30878]: pam_unix(sshd:auth): check pass; user unknown Jan 9 20:51:17 host sshd[30878]: Failed password for invalid user bt from 194.110.203.109 port 36798 ssh2 Jan 9 20:51:20 host sshd[30878]: Connection closed by 194.110.203.109 port 36798 [preauth] Jan 9 20:51:20 host sshd[30878]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 21:05:57 host sshd[475]: Invalid user deploy from 173.212.225.62 port 41654 Jan 9 21:05:57 host sshd[475]: input_userauth_request: invalid user deploy [preauth] Jan 9 21:05:57 host sshd[475]: pam_unix(sshd:auth): check pass; user unknown Jan 9 21:05:57 host sshd[475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 9 21:05:59 host sshd[475]: Failed password for invalid user deploy from 173.212.225.62 port 41654 ssh2 Jan 9 21:05:59 host sshd[475]: Received disconnect from 173.212.225.62 port 41654:11: Bye Bye [preauth] Jan 9 21:05:59 host sshd[475]: Disconnected from 173.212.225.62 port 41654 [preauth] Jan 9 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 21:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=wwwrmswll user-7=wwwresourcehunte user-8=keralaholi user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=woodpeck user-17=wwwkapin user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=gifterman user-24=palco123 user-25=kottayamcalldriv user-26=phmetals user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 21:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CpmbnelY5e8N6vd3.~ Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CpmbnelY5e8N6vd3.~' Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CpmbnelY5e8N6vd3.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 21:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 21:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 21:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 21:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 21:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 21:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 21:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 21:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 21:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 21:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 21:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 21:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 21:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 21:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 21:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 21:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 21:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 21:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 21:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 21:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 21:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 21:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 21:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 21:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 21:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 21:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 21:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 22:00:09 host sshd[8305]: Invalid user distccd from 104.244.74.6 port 54432 Jan 9 22:00:09 host sshd[8305]: input_userauth_request: invalid user distccd [preauth] Jan 9 22:00:09 host sshd[8305]: pam_unix(sshd:auth): check pass; user unknown Jan 9 22:00:09 host sshd[8305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 9 22:00:11 host sshd[8305]: Failed password for invalid user distccd from 104.244.74.6 port 54432 ssh2 Jan 9 22:00:11 host sshd[8305]: Connection closed by 104.244.74.6 port 54432 [preauth] Jan 9 22:10:24 host sshd[9778]: Did not receive identification string from 222.237.78.200 port 35388 Jan 9 22:19:12 host sshd[11043]: Invalid user deploy from 173.212.225.62 port 58876 Jan 9 22:19:12 host sshd[11043]: input_userauth_request: invalid user deploy [preauth] Jan 9 22:19:13 host sshd[11043]: pam_unix(sshd:auth): check pass; user unknown Jan 9 22:19:13 host sshd[11043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 9 22:19:15 host sshd[11043]: Failed password for invalid user deploy from 173.212.225.62 port 58876 ssh2 Jan 9 22:19:15 host sshd[11043]: Received disconnect from 173.212.225.62 port 58876:11: Bye Bye [preauth] Jan 9 22:19:15 host sshd[11043]: Disconnected from 173.212.225.62 port 58876 [preauth] Jan 9 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 22:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=ugotscom user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=remysagr user-15=disposeat user-16=wwwkmaorg user-17=pmcresources user-18=vfmassets user-19=wwwtestugo user-20=shalinijames user-21=wwwletsstalkfood user-22=straightcurve user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=gifterman user-28=palco123 user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 22:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xW2LpiHv8aIHpgwL.~ Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xW2LpiHv8aIHpgwL.~' Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xW2LpiHv8aIHpgwL.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 22:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 22:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 22:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 22:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 22:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 22:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 22:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 22:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 22:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 22:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 22:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 22:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 22:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 22:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 22:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 22:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 22:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 22:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 22:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 22:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 22:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 22:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 22:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 22:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 22:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 22:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 22:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 22:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 22:43:22 host sshd[14691]: Invalid user admin from 195.226.194.242 port 60326 Jan 9 22:43:22 host sshd[14691]: input_userauth_request: invalid user admin [preauth] Jan 9 22:43:22 host sshd[14691]: pam_unix(sshd:auth): check pass; user unknown Jan 9 22:43:22 host sshd[14691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 9 22:43:25 host sshd[14691]: Failed password for invalid user admin from 195.226.194.242 port 60326 ssh2 Jan 9 22:43:25 host sshd[14691]: Received disconnect from 195.226.194.242 port 60326:11: Bye Bye [preauth] Jan 9 22:43:25 host sshd[14691]: Disconnected from 195.226.194.242 port 60326 [preauth] Jan 9 22:49:16 host sshd[15481]: Invalid user bu from 194.110.203.109 port 50654 Jan 9 22:49:16 host sshd[15481]: input_userauth_request: invalid user bu [preauth] Jan 9 22:49:16 host sshd[15481]: pam_unix(sshd:auth): check pass; user unknown Jan 9 22:49:16 host sshd[15481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 22:49:18 host sshd[15481]: Failed password for invalid user bu from 194.110.203.109 port 50654 ssh2 Jan 9 22:49:21 host sshd[15481]: pam_unix(sshd:auth): check pass; user unknown Jan 9 22:49:22 host sshd[15481]: Failed password for invalid user bu from 194.110.203.109 port 50654 ssh2 Jan 9 22:49:25 host sshd[15481]: pam_unix(sshd:auth): check pass; user unknown Jan 9 22:49:28 host sshd[15481]: Failed password for invalid user bu from 194.110.203.109 port 50654 ssh2 Jan 9 22:49:31 host sshd[15481]: Connection closed by 194.110.203.109 port 50654 [preauth] Jan 9 22:49:31 host sshd[15481]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 9 23:04:34 host sshd[17568]: Did not receive identification string from 1.116.46.30 port 50552 Jan 9 23:04:39 host sshd[17586]: Invalid user test from 1.116.46.30 port 35671 Jan 9 23:04:39 host sshd[17586]: input_userauth_request: invalid user test [preauth] Jan 9 23:04:39 host sshd[17592]: Invalid user dockeradmin from 1.116.46.30 port 35716 Jan 9 23:04:39 host sshd[17592]: input_userauth_request: invalid user dockeradmin [preauth] Jan 9 23:04:39 host sshd[17586]: pam_unix(sshd:auth): check pass; user unknown Jan 9 23:04:39 host sshd[17586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Jan 9 23:04:39 host sshd[17592]: pam_unix(sshd:auth): check pass; user unknown Jan 9 23:04:39 host sshd[17592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Jan 9 23:04:39 host sshd[17570]: Invalid user bitrix from 1.116.46.30 port 35676 Jan 9 23:04:39 host sshd[17570]: input_userauth_request: invalid user bitrix [preauth] Jan 9 23:04:40 host sshd[17570]: pam_unix(sshd:auth): check pass; user unknown Jan 9 23:04:40 host sshd[17570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Jan 9 23:04:40 host sshd[17602]: Invalid user test from 1.116.46.30 port 35684 Jan 9 23:04:40 host sshd[17602]: input_userauth_request: invalid user test [preauth] Jan 9 23:04:40 host sshd[17582]: Invalid user www from 1.116.46.30 port 35703 Jan 9 23:04:40 host sshd[17582]: input_userauth_request: invalid user www [preauth] Jan 9 23:04:41 host sshd[17578]: Invalid user steam from 1.116.46.30 port 35700 Jan 9 23:04:41 host sshd[17578]: input_userauth_request: invalid user steam [preauth] Jan 9 23:04:41 host sshd[17602]: pam_unix(sshd:auth): check pass; user unknown Jan 9 23:04:41 host sshd[17602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Jan 9 23:04:41 host sshd[17594]: Invalid user ubuntu from 1.116.46.30 port 35694 Jan 9 23:04:41 host sshd[17594]: input_userauth_request: invalid user ubuntu [preauth] Jan 9 23:04:41 host sshd[17578]: pam_unix(sshd:auth): check pass; user unknown Jan 9 23:04:41 host sshd[17578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Jan 9 23:04:41 host sshd[17594]: pam_unix(sshd:auth): check pass; user unknown Jan 9 23:04:41 host sshd[17594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Jan 9 23:04:41 host sshd[17570]: Failed password for invalid user bitrix from 1.116.46.30 port 35676 ssh2 Jan 9 23:04:42 host sshd[17586]: Failed password for invalid user test from 1.116.46.30 port 35671 ssh2 Jan 9 23:04:42 host sshd[17582]: pam_unix(sshd:auth): check pass; user unknown Jan 9 23:04:42 host sshd[17582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Jan 9 23:04:42 host sshd[17570]: Connection closed by 1.116.46.30 port 35676 [preauth] Jan 9 23:04:42 host sshd[17592]: Failed password for invalid user dockeradmin from 1.116.46.30 port 35716 ssh2 Jan 9 23:04:42 host sshd[17586]: Connection closed by 1.116.46.30 port 35671 [preauth] Jan 9 23:04:42 host sshd[17592]: Connection closed by 1.116.46.30 port 35716 [preauth] Jan 9 23:04:43 host sshd[17602]: Failed password for invalid user test from 1.116.46.30 port 35684 ssh2 Jan 9 23:04:43 host sshd[17578]: Failed password for invalid user steam from 1.116.46.30 port 35700 ssh2 Jan 9 23:04:43 host sshd[17602]: Connection closed by 1.116.46.30 port 35684 [preauth] Jan 9 23:04:43 host sshd[17584]: Invalid user ts3 from 1.116.46.30 port 35674 Jan 9 23:04:43 host sshd[17584]: input_userauth_request: invalid user ts3 [preauth] Jan 9 23:04:43 host sshd[17594]: Failed password for invalid user ubuntu from 1.116.46.30 port 35694 ssh2 Jan 9 23:04:43 host sshd[17578]: Connection closed by 1.116.46.30 port 35700 [preauth] Jan 9 23:04:43 host sshd[17584]: pam_unix(sshd:auth): check pass; user unknown Jan 9 23:04:43 host sshd[17584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Jan 9 23:04:43 host sshd[17582]: Failed password for invalid user www from 1.116.46.30 port 35703 ssh2 Jan 9 23:04:43 host sshd[17594]: Connection closed by 1.116.46.30 port 35694 [preauth] Jan 9 23:04:43 host sshd[17600]: Invalid user ubuntu from 1.116.46.30 port 35738 Jan 9 23:04:43 host sshd[17600]: input_userauth_request: invalid user ubuntu [preauth] Jan 9 23:04:44 host sshd[17582]: Connection closed by 1.116.46.30 port 35703 [preauth] Jan 9 23:04:44 host sshd[17600]: pam_unix(sshd:auth): check pass; user unknown Jan 9 23:04:44 host sshd[17600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.46.30 Jan 9 23:04:44 host sshd[17574]: Invalid user fa from 1.116.46.30 port 35678 Jan 9 23:04:44 host sshd[17574]: input_userauth_request: invalid user fa [preauth] Jan 9 23:04:45 host sshd[17584]: Failed password for invalid user ts3 from 1.116.46.30 port 35674 ssh2 Jan 9 23:04:46 host sshd[17600]: Failed password for invalid user ubuntu from 1.116.46.30 port 35738 ssh2 Jan 9 23:16:54 host sshd[19237]: User root from 202.56.232.54 not allowed because not listed in AllowUsers Jan 9 23:16:54 host sshd[19237]: input_userauth_request: invalid user root [preauth] Jan 9 23:16:54 host unix_chkpwd[19240]: password check failed for user (root) Jan 9 23:16:54 host sshd[19237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.56.232.54 user=root Jan 9 23:16:54 host sshd[19237]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 23:16:56 host sshd[19237]: Failed password for invalid user root from 202.56.232.54 port 36608 ssh2 Jan 9 23:16:56 host sshd[19237]: Received disconnect from 202.56.232.54 port 36608:11: Bye Bye [preauth] Jan 9 23:16:56 host sshd[19237]: Disconnected from 202.56.232.54 port 36608 [preauth] Jan 9 23:17:47 host sshd[19398]: User root from 89.116.229.45 not allowed because not listed in AllowUsers Jan 9 23:17:47 host sshd[19398]: input_userauth_request: invalid user root [preauth] Jan 9 23:17:47 host unix_chkpwd[19402]: password check failed for user (root) Jan 9 23:17:47 host sshd[19398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.116.229.45 user=root Jan 9 23:17:47 host sshd[19398]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 23:17:48 host sshd[19398]: Failed password for invalid user root from 89.116.229.45 port 60284 ssh2 Jan 9 23:17:49 host sshd[19398]: Received disconnect from 89.116.229.45 port 60284:11: Bye Bye [preauth] Jan 9 23:17:49 host sshd[19398]: Disconnected from 89.116.229.45 port 60284 [preauth] Jan 9 23:19:12 host sshd[19594]: User root from 182.70.115.11 not allowed because not listed in AllowUsers Jan 9 23:19:12 host sshd[19594]: input_userauth_request: invalid user root [preauth] Jan 9 23:19:12 host unix_chkpwd[19596]: password check failed for user (root) Jan 9 23:19:12 host sshd[19594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.115.11 user=root Jan 9 23:19:12 host sshd[19594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 23:19:14 host sshd[19594]: Failed password for invalid user root from 182.70.115.11 port 37812 ssh2 Jan 9 23:19:14 host sshd[19594]: Received disconnect from 182.70.115.11 port 37812:11: Bye Bye [preauth] Jan 9 23:19:14 host sshd[19594]: Disconnected from 182.70.115.11 port 37812 [preauth] Jan 9 23:21:20 host sshd[19864]: User root from 54.180.93.20 not allowed because not listed in AllowUsers Jan 9 23:21:20 host sshd[19864]: input_userauth_request: invalid user root [preauth] Jan 9 23:21:20 host unix_chkpwd[19867]: password check failed for user (root) Jan 9 23:21:20 host sshd[19864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.180.93.20 user=root Jan 9 23:21:20 host sshd[19864]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 23:21:22 host sshd[19864]: Failed password for invalid user root from 54.180.93.20 port 37264 ssh2 Jan 9 23:21:22 host sshd[19864]: Received disconnect from 54.180.93.20 port 37264:11: Bye Bye [preauth] Jan 9 23:21:22 host sshd[19864]: Disconnected from 54.180.93.20 port 37264 [preauth] Jan 9 23:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 9 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=ugotscom user-12=disposeat user-13=remysagr user-14=wwwkmaorg user-15=wwwkapin user-16=woodpeck user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=straightcurve user-24=wwwletsstalkfood user-25=gifterman user-26=palco123 user-27=phmetals user-28=kottayamcalldriv user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 9 23:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 9 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-flIWN08BTFvHh2dO.~ Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-flIWN08BTFvHh2dO.~' Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-flIWN08BTFvHh2dO.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 23:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 9 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 9 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 9 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 9 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 9 23:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 9 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 9 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 9 23:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 9 23:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 9 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 9 23:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 9 23:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 9 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 9 23:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 9 23:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 9 23:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 9 23:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 23:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 23:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 9 23:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 23:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 23:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 9 23:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 9 23:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 9 23:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 9 23:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 23:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 23:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 9 23:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 9 23:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 9 23:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 9 23:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 9 23:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 9 23:23:40 host sshd[20354]: User root from 54.180.93.20 not allowed because not listed in AllowUsers Jan 9 23:23:40 host sshd[20354]: input_userauth_request: invalid user root [preauth] Jan 9 23:23:40 host unix_chkpwd[20356]: password check failed for user (root) Jan 9 23:23:40 host sshd[20354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.180.93.20 user=root Jan 9 23:23:40 host sshd[20354]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 23:23:42 host sshd[20354]: Failed password for invalid user root from 54.180.93.20 port 45708 ssh2 Jan 9 23:23:42 host sshd[20354]: Received disconnect from 54.180.93.20 port 45708:11: Bye Bye [preauth] Jan 9 23:23:42 host sshd[20354]: Disconnected from 54.180.93.20 port 45708 [preauth] Jan 9 23:23:46 host sshd[20398]: User root from 89.116.229.45 not allowed because not listed in AllowUsers Jan 9 23:23:46 host sshd[20398]: input_userauth_request: invalid user root [preauth] Jan 9 23:23:46 host unix_chkpwd[20448]: password check failed for user (root) Jan 9 23:23:46 host sshd[20398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.116.229.45 user=root Jan 9 23:23:46 host sshd[20398]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 23:23:48 host sshd[20398]: Failed password for invalid user root from 89.116.229.45 port 42672 ssh2 Jan 9 23:23:48 host sshd[20398]: Received disconnect from 89.116.229.45 port 42672:11: Bye Bye [preauth] Jan 9 23:23:48 host sshd[20398]: Disconnected from 89.116.229.45 port 42672 [preauth] Jan 9 23:24:15 host sshd[20600]: User root from 182.70.115.11 not allowed because not listed in AllowUsers Jan 9 23:24:15 host sshd[20600]: input_userauth_request: invalid user root [preauth] Jan 9 23:24:15 host unix_chkpwd[20602]: password check failed for user (root) Jan 9 23:24:15 host sshd[20600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.115.11 user=root Jan 9 23:24:15 host sshd[20600]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 23:24:17 host sshd[20600]: Failed password for invalid user root from 182.70.115.11 port 34744 ssh2 Jan 9 23:24:17 host sshd[20600]: Received disconnect from 182.70.115.11 port 34744:11: Bye Bye [preauth] Jan 9 23:24:17 host sshd[20600]: Disconnected from 182.70.115.11 port 34744 [preauth] Jan 9 23:32:30 host sshd[21896]: Invalid user developer from 173.212.225.62 port 47882 Jan 9 23:32:30 host sshd[21896]: input_userauth_request: invalid user developer [preauth] Jan 9 23:32:30 host sshd[21896]: pam_unix(sshd:auth): check pass; user unknown Jan 9 23:32:30 host sshd[21896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 9 23:32:32 host sshd[21896]: Failed password for invalid user developer from 173.212.225.62 port 47882 ssh2 Jan 9 23:32:33 host sshd[21896]: Received disconnect from 173.212.225.62 port 47882:11: Bye Bye [preauth] Jan 9 23:32:33 host sshd[21896]: Disconnected from 173.212.225.62 port 47882 [preauth] Jan 9 23:43:19 host sshd[23372]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 9 23:43:19 host sshd[23372]: input_userauth_request: invalid user root [preauth] Jan 9 23:43:19 host unix_chkpwd[23376]: password check failed for user (root) Jan 9 23:43:19 host sshd[23372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 9 23:43:19 host sshd[23372]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 9 23:43:21 host sshd[23372]: Failed password for invalid user root from 195.226.194.242 port 22658 ssh2 Jan 9 23:43:21 host sshd[23372]: Received disconnect from 195.226.194.242 port 22658:11: Bye Bye [preauth] Jan 9 23:43:21 host sshd[23372]: Disconnected from 195.226.194.242 port 22658 [preauth] Jan 9 23:46:38 host sshd[23838]: Did not receive identification string from 167.71.166.243 port 48250 Jan 9 23:48:58 host sshd[24072]: Connection closed by 167.71.166.243 port 53244 [preauth] Jan 10 00:06:38 host sshd[26487]: User root from 23.95.90.184 not allowed because not listed in AllowUsers Jan 10 00:06:38 host sshd[26487]: input_userauth_request: invalid user root [preauth] Jan 10 00:06:38 host unix_chkpwd[26492]: password check failed for user (root) Jan 10 00:06:38 host sshd[26487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.90.184 user=root Jan 10 00:06:38 host sshd[26487]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:06:41 host sshd[26487]: Failed password for invalid user root from 23.95.90.184 port 32884 ssh2 Jan 10 00:06:41 host sshd[26487]: Received disconnect from 23.95.90.184 port 32884:11: Bye Bye [preauth] Jan 10 00:06:41 host sshd[26487]: Disconnected from 23.95.90.184 port 32884 [preauth] Jan 10 00:07:05 host sshd[26545]: User root from 79.188.87.194 not allowed because not listed in AllowUsers Jan 10 00:07:05 host sshd[26545]: input_userauth_request: invalid user root [preauth] Jan 10 00:07:05 host unix_chkpwd[26548]: password check failed for user (root) Jan 10 00:07:05 host sshd[26545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.87.194 user=root Jan 10 00:07:05 host sshd[26545]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:07:07 host sshd[26545]: Failed password for invalid user root from 79.188.87.194 port 40958 ssh2 Jan 10 00:07:07 host sshd[26545]: Received disconnect from 79.188.87.194 port 40958:11: Bye Bye [preauth] Jan 10 00:07:07 host sshd[26545]: Disconnected from 79.188.87.194 port 40958 [preauth] Jan 10 00:07:08 host sshd[26553]: User root from 128.199.88.7 not allowed because not listed in AllowUsers Jan 10 00:07:08 host sshd[26553]: input_userauth_request: invalid user root [preauth] Jan 10 00:07:08 host unix_chkpwd[26555]: password check failed for user (root) Jan 10 00:07:08 host sshd[26553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.88.7 user=root Jan 10 00:07:08 host sshd[26553]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:07:10 host sshd[26553]: Failed password for invalid user root from 128.199.88.7 port 40458 ssh2 Jan 10 00:07:10 host sshd[26553]: Received disconnect from 128.199.88.7 port 40458:11: Bye Bye [preauth] Jan 10 00:07:10 host sshd[26553]: Disconnected from 128.199.88.7 port 40458 [preauth] Jan 10 00:07:29 host sshd[26607]: User root from 103.31.38.132 not allowed because not listed in AllowUsers Jan 10 00:07:29 host sshd[26607]: input_userauth_request: invalid user root [preauth] Jan 10 00:07:29 host unix_chkpwd[26609]: password check failed for user (root) Jan 10 00:07:29 host sshd[26607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.31.38.132 user=root Jan 10 00:07:29 host sshd[26607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:07:31 host sshd[26607]: Failed password for invalid user root from 103.31.38.132 port 53360 ssh2 Jan 10 00:07:31 host sshd[26607]: Received disconnect from 103.31.38.132 port 53360:11: Bye Bye [preauth] Jan 10 00:07:31 host sshd[26607]: Disconnected from 103.31.38.132 port 53360 [preauth] Jan 10 00:07:50 host sshd[26643]: User root from 157.230.42.195 not allowed because not listed in AllowUsers Jan 10 00:07:50 host sshd[26643]: input_userauth_request: invalid user root [preauth] Jan 10 00:07:50 host unix_chkpwd[26645]: password check failed for user (root) Jan 10 00:07:50 host sshd[26643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.42.195 user=root Jan 10 00:07:50 host sshd[26643]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:07:51 host sshd[26647]: User root from 128.199.120.146 not allowed because not listed in AllowUsers Jan 10 00:07:51 host sshd[26647]: input_userauth_request: invalid user root [preauth] Jan 10 00:07:51 host unix_chkpwd[26649]: password check failed for user (root) Jan 10 00:07:51 host sshd[26647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.120.146 user=root Jan 10 00:07:51 host sshd[26647]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:07:53 host sshd[26643]: Failed password for invalid user root from 157.230.42.195 port 42010 ssh2 Jan 10 00:07:53 host sshd[26643]: Received disconnect from 157.230.42.195 port 42010:11: Bye Bye [preauth] Jan 10 00:07:53 host sshd[26643]: Disconnected from 157.230.42.195 port 42010 [preauth] Jan 10 00:07:53 host sshd[26647]: Failed password for invalid user root from 128.199.120.146 port 38000 ssh2 Jan 10 00:07:53 host sshd[26647]: Received disconnect from 128.199.120.146 port 38000:11: Bye Bye [preauth] Jan 10 00:07:53 host sshd[26647]: Disconnected from 128.199.120.146 port 38000 [preauth] Jan 10 00:08:05 host sshd[26680]: User root from 170.64.138.123 not allowed because not listed in AllowUsers Jan 10 00:08:05 host sshd[26680]: input_userauth_request: invalid user root [preauth] Jan 10 00:08:05 host unix_chkpwd[26683]: password check failed for user (root) Jan 10 00:08:05 host sshd[26680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.138.123 user=root Jan 10 00:08:05 host sshd[26680]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:08:07 host sshd[26680]: Failed password for invalid user root from 170.64.138.123 port 39244 ssh2 Jan 10 00:08:07 host sshd[26680]: Received disconnect from 170.64.138.123 port 39244:11: Bye Bye [preauth] Jan 10 00:08:07 host sshd[26680]: Disconnected from 170.64.138.123 port 39244 [preauth] Jan 10 00:08:11 host sshd[26689]: User root from 157.90.249.21 not allowed because not listed in AllowUsers Jan 10 00:08:11 host sshd[26689]: input_userauth_request: invalid user root [preauth] Jan 10 00:08:11 host unix_chkpwd[26692]: password check failed for user (root) Jan 10 00:08:11 host sshd[26689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.90.249.21 user=root Jan 10 00:08:11 host sshd[26689]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:08:13 host sshd[26693]: User root from 137.184.37.163 not allowed because not listed in AllowUsers Jan 10 00:08:13 host sshd[26693]: input_userauth_request: invalid user root [preauth] Jan 10 00:08:13 host unix_chkpwd[26696]: password check failed for user (root) Jan 10 00:08:13 host sshd[26693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.37.163 user=root Jan 10 00:08:13 host sshd[26693]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:08:13 host sshd[26689]: Failed password for invalid user root from 157.90.249.21 port 60138 ssh2 Jan 10 00:08:13 host sshd[26689]: Received disconnect from 157.90.249.21 port 60138:11: Bye Bye [preauth] Jan 10 00:08:13 host sshd[26689]: Disconnected from 157.90.249.21 port 60138 [preauth] Jan 10 00:08:15 host sshd[26693]: Failed password for invalid user root from 137.184.37.163 port 56814 ssh2 Jan 10 00:08:16 host sshd[26693]: Received disconnect from 137.184.37.163 port 56814:11: Bye Bye [preauth] Jan 10 00:08:16 host sshd[26693]: Disconnected from 137.184.37.163 port 56814 [preauth] Jan 10 00:08:25 host sshd[26709]: User root from 34.148.60.238 not allowed because not listed in AllowUsers Jan 10 00:08:25 host sshd[26709]: input_userauth_request: invalid user root [preauth] Jan 10 00:08:25 host unix_chkpwd[26713]: password check failed for user (root) Jan 10 00:08:25 host sshd[26709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.60.238 user=root Jan 10 00:08:25 host sshd[26709]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:08:27 host sshd[26709]: Failed password for invalid user root from 34.148.60.238 port 52974 ssh2 Jan 10 00:08:27 host sshd[26709]: Received disconnect from 34.148.60.238 port 52974:11: Bye Bye [preauth] Jan 10 00:08:27 host sshd[26709]: Disconnected from 34.148.60.238 port 52974 [preauth] Jan 10 00:08:30 host sshd[26743]: User root from 34.71.71.142 not allowed because not listed in AllowUsers Jan 10 00:08:30 host sshd[26743]: input_userauth_request: invalid user root [preauth] Jan 10 00:08:30 host unix_chkpwd[26747]: password check failed for user (root) Jan 10 00:08:30 host sshd[26743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.71.71.142 user=root Jan 10 00:08:30 host sshd[26743]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:08:32 host sshd[26749]: User root from 103.161.150.82 not allowed because not listed in AllowUsers Jan 10 00:08:32 host sshd[26749]: input_userauth_request: invalid user root [preauth] Jan 10 00:08:32 host unix_chkpwd[26752]: password check failed for user (root) Jan 10 00:08:32 host sshd[26749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.161.150.82 user=root Jan 10 00:08:32 host sshd[26749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:08:32 host sshd[26743]: Failed password for invalid user root from 34.71.71.142 port 36100 ssh2 Jan 10 00:08:32 host sshd[26743]: Received disconnect from 34.71.71.142 port 36100:11: Bye Bye [preauth] Jan 10 00:08:32 host sshd[26743]: Disconnected from 34.71.71.142 port 36100 [preauth] Jan 10 00:08:34 host sshd[26749]: Failed password for invalid user root from 103.161.150.82 port 60810 ssh2 Jan 10 00:08:34 host sshd[26749]: Received disconnect from 103.161.150.82 port 60810:11: Bye Bye [preauth] Jan 10 00:08:34 host sshd[26749]: Disconnected from 103.161.150.82 port 60810 [preauth] Jan 10 00:08:34 host sshd[26756]: User root from 116.202.103.52 not allowed because not listed in AllowUsers Jan 10 00:08:34 host sshd[26756]: input_userauth_request: invalid user root [preauth] Jan 10 00:08:34 host unix_chkpwd[26759]: password check failed for user (root) Jan 10 00:08:34 host sshd[26756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.202.103.52 user=root Jan 10 00:08:34 host sshd[26756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:08:36 host sshd[26756]: Failed password for invalid user root from 116.202.103.52 port 39744 ssh2 Jan 10 00:08:36 host sshd[26756]: Received disconnect from 116.202.103.52 port 39744:11: Bye Bye [preauth] Jan 10 00:08:36 host sshd[26756]: Disconnected from 116.202.103.52 port 39744 [preauth] Jan 10 00:08:47 host sshd[26774]: User root from 147.182.237.31 not allowed because not listed in AllowUsers Jan 10 00:08:47 host sshd[26774]: input_userauth_request: invalid user root [preauth] Jan 10 00:08:47 host unix_chkpwd[26777]: password check failed for user (root) Jan 10 00:08:47 host sshd[26774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.237.31 user=root Jan 10 00:08:47 host sshd[26774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:08:49 host sshd[26774]: Failed password for invalid user root from 147.182.237.31 port 38642 ssh2 Jan 10 00:08:50 host sshd[26774]: Received disconnect from 147.182.237.31 port 38642:11: Bye Bye [preauth] Jan 10 00:08:50 host sshd[26774]: Disconnected from 147.182.237.31 port 38642 [preauth] Jan 10 00:08:57 host sshd[26799]: User root from 81.183.208.244 not allowed because not listed in AllowUsers Jan 10 00:08:57 host sshd[26799]: input_userauth_request: invalid user root [preauth] Jan 10 00:08:58 host unix_chkpwd[26805]: password check failed for user (root) Jan 10 00:08:58 host sshd[26799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.208.244 user=root Jan 10 00:08:58 host sshd[26799]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:08:59 host sshd[26799]: Failed password for invalid user root from 81.183.208.244 port 41108 ssh2 Jan 10 00:08:59 host sshd[26799]: Received disconnect from 81.183.208.244 port 41108:11: Bye Bye [preauth] Jan 10 00:08:59 host sshd[26799]: Disconnected from 81.183.208.244 port 41108 [preauth] Jan 10 00:09:13 host sshd[26860]: User root from 45.118.147.188 not allowed because not listed in AllowUsers Jan 10 00:09:13 host sshd[26860]: input_userauth_request: invalid user root [preauth] Jan 10 00:09:13 host unix_chkpwd[26863]: password check failed for user (root) Jan 10 00:09:13 host sshd[26860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.118.147.188 user=root Jan 10 00:09:13 host sshd[26860]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:09:14 host sshd[26868]: User root from 167.172.89.146 not allowed because not listed in AllowUsers Jan 10 00:09:14 host sshd[26868]: input_userauth_request: invalid user root [preauth] Jan 10 00:09:14 host unix_chkpwd[26870]: password check failed for user (root) Jan 10 00:09:14 host sshd[26868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.89.146 user=root Jan 10 00:09:14 host sshd[26868]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:09:16 host sshd[26860]: Failed password for invalid user root from 45.118.147.188 port 52620 ssh2 Jan 10 00:09:16 host sshd[26860]: Received disconnect from 45.118.147.188 port 52620:11: Bye Bye [preauth] Jan 10 00:09:16 host sshd[26860]: Disconnected from 45.118.147.188 port 52620 [preauth] Jan 10 00:09:16 host sshd[26868]: Failed password for invalid user root from 167.172.89.146 port 34686 ssh2 Jan 10 00:09:16 host sshd[26868]: Received disconnect from 167.172.89.146 port 34686:11: Bye Bye [preauth] Jan 10 00:09:16 host sshd[26868]: Disconnected from 167.172.89.146 port 34686 [preauth] Jan 10 00:09:18 host sshd[26876]: User root from 192.3.3.226 not allowed because not listed in AllowUsers Jan 10 00:09:18 host sshd[26876]: input_userauth_request: invalid user root [preauth] Jan 10 00:09:18 host unix_chkpwd[26886]: password check failed for user (root) Jan 10 00:09:18 host sshd[26876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.3.226 user=root Jan 10 00:09:18 host sshd[26876]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:09:20 host sshd[26876]: Failed password for invalid user root from 192.3.3.226 port 13538 ssh2 Jan 10 00:09:21 host sshd[26876]: Received disconnect from 192.3.3.226 port 13538:11: Bye Bye [preauth] Jan 10 00:09:21 host sshd[26876]: Disconnected from 192.3.3.226 port 13538 [preauth] Jan 10 00:09:31 host sshd[26926]: User root from 134.209.103.60 not allowed because not listed in AllowUsers Jan 10 00:09:31 host sshd[26926]: input_userauth_request: invalid user root [preauth] Jan 10 00:09:31 host unix_chkpwd[26928]: password check failed for user (root) Jan 10 00:09:31 host sshd[26926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.103.60 user=root Jan 10 00:09:31 host sshd[26926]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:09:33 host sshd[26926]: Failed password for invalid user root from 134.209.103.60 port 49994 ssh2 Jan 10 00:09:33 host sshd[26926]: Received disconnect from 134.209.103.60 port 49994:11: Bye Bye [preauth] Jan 10 00:09:33 host sshd[26926]: Disconnected from 134.209.103.60 port 49994 [preauth] Jan 10 00:09:39 host sshd[26937]: User root from 142.93.184.194 not allowed because not listed in AllowUsers Jan 10 00:09:39 host sshd[26937]: input_userauth_request: invalid user root [preauth] Jan 10 00:09:39 host unix_chkpwd[26949]: password check failed for user (root) Jan 10 00:09:39 host sshd[26937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.184.194 user=root Jan 10 00:09:39 host sshd[26937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:09:40 host sshd[26947]: User root from 188.170.13.225 not allowed because not listed in AllowUsers Jan 10 00:09:40 host sshd[26947]: input_userauth_request: invalid user root [preauth] Jan 10 00:09:40 host unix_chkpwd[26950]: password check failed for user (root) Jan 10 00:09:40 host sshd[26947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.13.225 user=root Jan 10 00:09:40 host sshd[26947]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:09:41 host sshd[26937]: Failed password for invalid user root from 142.93.184.194 port 50900 ssh2 Jan 10 00:09:41 host sshd[26947]: Failed password for invalid user root from 188.170.13.225 port 52312 ssh2 Jan 10 00:09:41 host sshd[26937]: Received disconnect from 142.93.184.194 port 50900:11: Bye Bye [preauth] Jan 10 00:09:41 host sshd[26937]: Disconnected from 142.93.184.194 port 50900 [preauth] Jan 10 00:09:41 host sshd[26947]: Received disconnect from 188.170.13.225 port 52312:11: Bye Bye [preauth] Jan 10 00:09:41 host sshd[26947]: Disconnected from 188.170.13.225 port 52312 [preauth] Jan 10 00:09:51 host sshd[26968]: User root from 165.22.181.245 not allowed because not listed in AllowUsers Jan 10 00:09:51 host sshd[26968]: input_userauth_request: invalid user root [preauth] Jan 10 00:09:51 host unix_chkpwd[26974]: password check failed for user (root) Jan 10 00:09:51 host sshd[26968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.181.245 user=root Jan 10 00:09:51 host sshd[26968]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:09:52 host sshd[26968]: Failed password for invalid user root from 165.22.181.245 port 49560 ssh2 Jan 10 00:09:53 host sshd[26968]: Received disconnect from 165.22.181.245 port 49560:11: Bye Bye [preauth] Jan 10 00:09:53 host sshd[26968]: Disconnected from 165.22.181.245 port 49560 [preauth] Jan 10 00:09:54 host sshd[26986]: User root from 128.199.212.131 not allowed because not listed in AllowUsers Jan 10 00:09:54 host sshd[26986]: input_userauth_request: invalid user root [preauth] Jan 10 00:09:54 host unix_chkpwd[26990]: password check failed for user (root) Jan 10 00:09:54 host sshd[26986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.212.131 user=root Jan 10 00:09:54 host sshd[26986]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:09:56 host sshd[26986]: Failed password for invalid user root from 128.199.212.131 port 44882 ssh2 Jan 10 00:09:56 host sshd[26986]: Received disconnect from 128.199.212.131 port 44882:11: Bye Bye [preauth] Jan 10 00:09:56 host sshd[26986]: Disconnected from 128.199.212.131 port 44882 [preauth] Jan 10 00:10:09 host sshd[27051]: User root from 146.190.127.135 not allowed because not listed in AllowUsers Jan 10 00:10:09 host sshd[27051]: input_userauth_request: invalid user root [preauth] Jan 10 00:10:09 host unix_chkpwd[27056]: password check failed for user (root) Jan 10 00:10:09 host sshd[27051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.127.135 user=root Jan 10 00:10:09 host sshd[27051]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:10:10 host sshd[27051]: Failed password for invalid user root from 146.190.127.135 port 47540 ssh2 Jan 10 00:10:11 host sshd[27051]: Received disconnect from 146.190.127.135 port 47540:11: Bye Bye [preauth] Jan 10 00:10:11 host sshd[27051]: Disconnected from 146.190.127.135 port 47540 [preauth] Jan 10 00:10:20 host sshd[27075]: User root from 116.193.191.248 not allowed because not listed in AllowUsers Jan 10 00:10:20 host sshd[27075]: input_userauth_request: invalid user root [preauth] Jan 10 00:10:20 host unix_chkpwd[27077]: password check failed for user (root) Jan 10 00:10:20 host sshd[27075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.191.248 user=root Jan 10 00:10:20 host sshd[27075]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:10:23 host sshd[27075]: Failed password for invalid user root from 116.193.191.248 port 54316 ssh2 Jan 10 00:10:23 host sshd[27075]: Received disconnect from 116.193.191.248 port 54316:11: Bye Bye [preauth] Jan 10 00:10:23 host sshd[27075]: Disconnected from 116.193.191.248 port 54316 [preauth] Jan 10 00:10:36 host sshd[27221]: User root from 143.198.165.210 not allowed because not listed in AllowUsers Jan 10 00:10:36 host sshd[27221]: input_userauth_request: invalid user root [preauth] Jan 10 00:10:37 host unix_chkpwd[27224]: password check failed for user (root) Jan 10 00:10:37 host sshd[27221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.165.210 user=root Jan 10 00:10:37 host sshd[27221]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:10:39 host sshd[27221]: Failed password for invalid user root from 143.198.165.210 port 54034 ssh2 Jan 10 00:10:39 host sshd[27221]: Received disconnect from 143.198.165.210 port 54034:11: Bye Bye [preauth] Jan 10 00:10:39 host sshd[27221]: Disconnected from 143.198.165.210 port 54034 [preauth] Jan 10 00:10:45 host sshd[27236]: User root from 20.190.192.238 not allowed because not listed in AllowUsers Jan 10 00:10:45 host sshd[27236]: input_userauth_request: invalid user root [preauth] Jan 10 00:10:45 host unix_chkpwd[27239]: password check failed for user (root) Jan 10 00:10:45 host sshd[27236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.190.192.238 user=root Jan 10 00:10:45 host sshd[27236]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:10:47 host sshd[27236]: Failed password for invalid user root from 20.190.192.238 port 33760 ssh2 Jan 10 00:10:47 host sshd[27236]: Received disconnect from 20.190.192.238 port 33760:11: Bye Bye [preauth] Jan 10 00:10:47 host sshd[27236]: Disconnected from 20.190.192.238 port 33760 [preauth] Jan 10 00:11:03 host sshd[27286]: User root from 77.82.90.234 not allowed because not listed in AllowUsers Jan 10 00:11:03 host sshd[27286]: input_userauth_request: invalid user root [preauth] Jan 10 00:11:03 host unix_chkpwd[27289]: password check failed for user (root) Jan 10 00:11:03 host sshd[27286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.82.90.234 user=root Jan 10 00:11:03 host sshd[27286]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:11:05 host sshd[27286]: Failed password for invalid user root from 77.82.90.234 port 38078 ssh2 Jan 10 00:11:05 host sshd[27286]: Received disconnect from 77.82.90.234 port 38078:11: Bye Bye [preauth] Jan 10 00:11:05 host sshd[27286]: Disconnected from 77.82.90.234 port 38078 [preauth] Jan 10 00:11:06 host sshd[27296]: User root from 84.201.159.27 not allowed because not listed in AllowUsers Jan 10 00:11:06 host sshd[27296]: input_userauth_request: invalid user root [preauth] Jan 10 00:11:06 host unix_chkpwd[27301]: password check failed for user (root) Jan 10 00:11:06 host sshd[27296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.159.27 user=root Jan 10 00:11:06 host sshd[27296]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:11:09 host sshd[27296]: Failed password for invalid user root from 84.201.159.27 port 53196 ssh2 Jan 10 00:11:09 host sshd[27311]: User root from 139.59.104.150 not allowed because not listed in AllowUsers Jan 10 00:11:09 host sshd[27311]: input_userauth_request: invalid user root [preauth] Jan 10 00:11:09 host unix_chkpwd[27313]: password check failed for user (root) Jan 10 00:11:09 host sshd[27311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.104.150 user=root Jan 10 00:11:09 host sshd[27311]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:11:09 host sshd[27296]: Received disconnect from 84.201.159.27 port 53196:11: Bye Bye [preauth] Jan 10 00:11:09 host sshd[27296]: Disconnected from 84.201.159.27 port 53196 [preauth] Jan 10 00:11:11 host sshd[27311]: Failed password for invalid user root from 139.59.104.150 port 47720 ssh2 Jan 10 00:11:11 host sshd[27311]: Received disconnect from 139.59.104.150 port 47720:11: Bye Bye [preauth] Jan 10 00:11:11 host sshd[27311]: Disconnected from 139.59.104.150 port 47720 [preauth] Jan 10 00:11:17 host sshd[27323]: User root from 211.21.113.128 not allowed because not listed in AllowUsers Jan 10 00:11:17 host sshd[27323]: input_userauth_request: invalid user root [preauth] Jan 10 00:11:17 host unix_chkpwd[27325]: password check failed for user (root) Jan 10 00:11:17 host sshd[27323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.21.113.128 user=root Jan 10 00:11:17 host sshd[27323]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:11:18 host sshd[27323]: Failed password for invalid user root from 211.21.113.128 port 32774 ssh2 Jan 10 00:11:19 host sshd[27323]: Received disconnect from 211.21.113.128 port 32774:11: Bye Bye [preauth] Jan 10 00:11:19 host sshd[27323]: Disconnected from 211.21.113.128 port 32774 [preauth] Jan 10 00:11:34 host sshd[27370]: User root from 157.90.249.21 not allowed because not listed in AllowUsers Jan 10 00:11:34 host sshd[27370]: input_userauth_request: invalid user root [preauth] Jan 10 00:11:34 host unix_chkpwd[27373]: password check failed for user (root) Jan 10 00:11:34 host sshd[27370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.90.249.21 user=root Jan 10 00:11:34 host sshd[27370]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:11:36 host sshd[27370]: Failed password for invalid user root from 157.90.249.21 port 56988 ssh2 Jan 10 00:11:36 host sshd[27370]: Received disconnect from 157.90.249.21 port 56988:11: Bye Bye [preauth] Jan 10 00:11:36 host sshd[27370]: Disconnected from 157.90.249.21 port 56988 [preauth] Jan 10 00:11:43 host sshd[27418]: User root from 164.92.112.145 not allowed because not listed in AllowUsers Jan 10 00:11:43 host sshd[27418]: input_userauth_request: invalid user root [preauth] Jan 10 00:11:43 host unix_chkpwd[27424]: password check failed for user (root) Jan 10 00:11:43 host sshd[27418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.112.145 user=root Jan 10 00:11:43 host sshd[27418]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:11:46 host sshd[27418]: Failed password for invalid user root from 164.92.112.145 port 37674 ssh2 Jan 10 00:11:46 host sshd[27418]: Received disconnect from 164.92.112.145 port 37674:11: Bye Bye [preauth] Jan 10 00:11:46 host sshd[27418]: Disconnected from 164.92.112.145 port 37674 [preauth] Jan 10 00:11:56 host sshd[27446]: User root from 128.199.208.187 not allowed because not listed in AllowUsers Jan 10 00:11:56 host sshd[27446]: input_userauth_request: invalid user root [preauth] Jan 10 00:11:56 host unix_chkpwd[27448]: password check failed for user (root) Jan 10 00:11:56 host sshd[27446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.208.187 user=root Jan 10 00:11:56 host sshd[27446]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:11:56 host sshd[27444]: User root from 13.40.100.6 not allowed because not listed in AllowUsers Jan 10 00:11:56 host sshd[27444]: input_userauth_request: invalid user root [preauth] Jan 10 00:11:56 host unix_chkpwd[27450]: password check failed for user (root) Jan 10 00:11:56 host sshd[27444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.40.100.6 user=root Jan 10 00:11:56 host sshd[27444]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:11:57 host sshd[27441]: User root from 34.71.71.142 not allowed because not listed in AllowUsers Jan 10 00:11:57 host sshd[27441]: input_userauth_request: invalid user root [preauth] Jan 10 00:11:57 host unix_chkpwd[27452]: password check failed for user (root) Jan 10 00:11:57 host sshd[27441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.71.71.142 user=root Jan 10 00:11:57 host sshd[27441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:11:58 host sshd[27446]: Failed password for invalid user root from 128.199.208.187 port 33692 ssh2 Jan 10 00:11:58 host sshd[27446]: Received disconnect from 128.199.208.187 port 33692:11: Bye Bye [preauth] Jan 10 00:11:58 host sshd[27446]: Disconnected from 128.199.208.187 port 33692 [preauth] Jan 10 00:11:58 host sshd[27441]: Failed password for invalid user root from 34.71.71.142 port 49464 ssh2 Jan 10 00:11:59 host sshd[27444]: Failed password for invalid user root from 13.40.100.6 port 40266 ssh2 Jan 10 00:11:59 host sshd[27444]: Received disconnect from 13.40.100.6 port 40266:11: Bye Bye [preauth] Jan 10 00:11:59 host sshd[27444]: Disconnected from 13.40.100.6 port 40266 [preauth] Jan 10 00:12:05 host sshd[27509]: User root from 116.202.103.52 not allowed because not listed in AllowUsers Jan 10 00:12:05 host sshd[27509]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:05 host unix_chkpwd[27512]: password check failed for user (root) Jan 10 00:12:05 host sshd[27509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.202.103.52 user=root Jan 10 00:12:05 host sshd[27509]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:07 host sshd[27509]: Failed password for invalid user root from 116.202.103.52 port 56108 ssh2 Jan 10 00:12:07 host sshd[27509]: Received disconnect from 116.202.103.52 port 56108:11: Bye Bye [preauth] Jan 10 00:12:07 host sshd[27509]: Disconnected from 116.202.103.52 port 56108 [preauth] Jan 10 00:12:08 host sshd[27517]: User root from 142.93.184.194 not allowed because not listed in AllowUsers Jan 10 00:12:08 host sshd[27517]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:08 host unix_chkpwd[27521]: password check failed for user (root) Jan 10 00:12:08 host sshd[27517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.184.194 user=root Jan 10 00:12:08 host sshd[27517]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:09 host sshd[27560]: User root from 103.31.38.132 not allowed because not listed in AllowUsers Jan 10 00:12:09 host sshd[27560]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:09 host unix_chkpwd[27585]: password check failed for user (root) Jan 10 00:12:09 host sshd[27560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.31.38.132 user=root Jan 10 00:12:09 host sshd[27560]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:10 host sshd[27572]: User root from 23.95.90.184 not allowed because not listed in AllowUsers Jan 10 00:12:10 host sshd[27572]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:10 host unix_chkpwd[27589]: password check failed for user (root) Jan 10 00:12:10 host sshd[27572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.90.184 user=root Jan 10 00:12:10 host sshd[27572]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:11 host sshd[27517]: Failed password for invalid user root from 142.93.184.194 port 36168 ssh2 Jan 10 00:12:11 host sshd[27560]: Failed password for invalid user root from 103.31.38.132 port 46552 ssh2 Jan 10 00:12:11 host sshd[27560]: Received disconnect from 103.31.38.132 port 46552:11: Bye Bye [preauth] Jan 10 00:12:11 host sshd[27560]: Disconnected from 103.31.38.132 port 46552 [preauth] Jan 10 00:12:12 host sshd[27572]: Failed password for invalid user root from 23.95.90.184 port 58424 ssh2 Jan 10 00:12:13 host sshd[27572]: Received disconnect from 23.95.90.184 port 58424:11: Bye Bye [preauth] Jan 10 00:12:13 host sshd[27572]: Disconnected from 23.95.90.184 port 58424 [preauth] Jan 10 00:12:16 host sshd[27659]: User root from 188.170.13.225 not allowed because not listed in AllowUsers Jan 10 00:12:16 host sshd[27659]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:16 host unix_chkpwd[27663]: password check failed for user (root) Jan 10 00:12:16 host sshd[27659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.13.225 user=root Jan 10 00:12:16 host sshd[27659]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:18 host sshd[27659]: Failed password for invalid user root from 188.170.13.225 port 54562 ssh2 Jan 10 00:12:18 host sshd[27659]: Received disconnect from 188.170.13.225 port 54562:11: Bye Bye [preauth] Jan 10 00:12:18 host sshd[27659]: Disconnected from 188.170.13.225 port 54562 [preauth] Jan 10 00:12:28 host sshd[27714]: User root from 103.161.150.82 not allowed because not listed in AllowUsers Jan 10 00:12:28 host sshd[27714]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:28 host unix_chkpwd[27740]: password check failed for user (root) Jan 10 00:12:28 host sshd[27714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.161.150.82 user=root Jan 10 00:12:28 host sshd[27714]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:31 host sshd[27742]: User root from 34.148.60.238 not allowed because not listed in AllowUsers Jan 10 00:12:31 host sshd[27742]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:31 host unix_chkpwd[27753]: password check failed for user (root) Jan 10 00:12:31 host sshd[27742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.148.60.238 user=root Jan 10 00:12:31 host sshd[27742]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:31 host sshd[27714]: Failed password for invalid user root from 103.161.150.82 port 55642 ssh2 Jan 10 00:12:31 host sshd[27714]: Received disconnect from 103.161.150.82 port 55642:11: Bye Bye [preauth] Jan 10 00:12:31 host sshd[27714]: Disconnected from 103.161.150.82 port 55642 [preauth] Jan 10 00:12:31 host sshd[27745]: User root from 137.184.37.163 not allowed because not listed in AllowUsers Jan 10 00:12:31 host sshd[27745]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:31 host unix_chkpwd[27754]: password check failed for user (root) Jan 10 00:12:31 host sshd[27745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.37.163 user=root Jan 10 00:12:31 host sshd[27745]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:32 host sshd[27756]: User root from 147.182.237.31 not allowed because not listed in AllowUsers Jan 10 00:12:32 host sshd[27756]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:32 host unix_chkpwd[27761]: password check failed for user (root) Jan 10 00:12:32 host sshd[27756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.237.31 user=root Jan 10 00:12:32 host sshd[27756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:33 host sshd[27763]: User root from 167.172.89.146 not allowed because not listed in AllowUsers Jan 10 00:12:33 host sshd[27763]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:33 host unix_chkpwd[27765]: password check failed for user (root) Jan 10 00:12:33 host sshd[27763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.89.146 user=root Jan 10 00:12:33 host sshd[27763]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:33 host sshd[27742]: Failed password for invalid user root from 34.148.60.238 port 49994 ssh2 Jan 10 00:12:33 host sshd[27742]: Received disconnect from 34.148.60.238 port 49994:11: Bye Bye [preauth] Jan 10 00:12:33 host sshd[27742]: Disconnected from 34.148.60.238 port 49994 [preauth] Jan 10 00:12:33 host sshd[27745]: Failed password for invalid user root from 137.184.37.163 port 47152 ssh2 Jan 10 00:12:34 host sshd[27745]: Received disconnect from 137.184.37.163 port 47152:11: Bye Bye [preauth] Jan 10 00:12:34 host sshd[27745]: Disconnected from 137.184.37.163 port 47152 [preauth] Jan 10 00:12:34 host sshd[27763]: Failed password for invalid user root from 167.172.89.146 port 56024 ssh2 Jan 10 00:12:35 host sshd[27756]: Failed password for invalid user root from 147.182.237.31 port 50960 ssh2 Jan 10 00:12:37 host sshd[27915]: User root from 79.188.87.194 not allowed because not listed in AllowUsers Jan 10 00:12:37 host sshd[27915]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:37 host unix_chkpwd[27918]: password check failed for user (root) Jan 10 00:12:37 host sshd[27915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.87.194 user=root Jan 10 00:12:37 host sshd[27915]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:39 host sshd[27915]: Failed password for invalid user root from 79.188.87.194 port 39150 ssh2 Jan 10 00:12:41 host sshd[27957]: User root from 128.199.88.7 not allowed because not listed in AllowUsers Jan 10 00:12:41 host sshd[27957]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:41 host unix_chkpwd[27960]: password check failed for user (root) Jan 10 00:12:41 host sshd[27957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.88.7 user=root Jan 10 00:12:41 host sshd[27957]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:43 host sshd[27957]: Failed password for invalid user root from 128.199.88.7 port 52224 ssh2 Jan 10 00:12:43 host sshd[27957]: Received disconnect from 128.199.88.7 port 52224:11: Bye Bye [preauth] Jan 10 00:12:43 host sshd[27957]: Disconnected from 128.199.88.7 port 52224 [preauth] Jan 10 00:12:47 host sshd[28001]: User root from 157.230.42.195 not allowed because not listed in AllowUsers Jan 10 00:12:47 host sshd[28001]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:47 host unix_chkpwd[28004]: password check failed for user (root) Jan 10 00:12:47 host sshd[28001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.42.195 user=root Jan 10 00:12:47 host sshd[28001]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:48 host sshd[28005]: User root from 128.199.120.146 not allowed because not listed in AllowUsers Jan 10 00:12:48 host sshd[28005]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:48 host unix_chkpwd[28008]: password check failed for user (root) Jan 10 00:12:48 host sshd[28005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.120.146 user=root Jan 10 00:12:48 host sshd[28005]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:49 host sshd[28001]: Failed password for invalid user root from 157.230.42.195 port 60358 ssh2 Jan 10 00:12:49 host sshd[28005]: Failed password for invalid user root from 128.199.120.146 port 56470 ssh2 Jan 10 00:12:54 host sshd[28075]: User root from 165.22.181.245 not allowed because not listed in AllowUsers Jan 10 00:12:54 host sshd[28075]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:54 host unix_chkpwd[28082]: password check failed for user (root) Jan 10 00:12:54 host sshd[28075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.181.245 user=root Jan 10 00:12:54 host sshd[28075]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:55 host sshd[28079]: User root from 84.201.159.27 not allowed because not listed in AllowUsers Jan 10 00:12:55 host sshd[28079]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:55 host unix_chkpwd[28085]: password check failed for user (root) Jan 10 00:12:55 host sshd[28079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.159.27 user=root Jan 10 00:12:55 host sshd[28079]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:56 host sshd[28083]: User root from 20.190.192.238 not allowed because not listed in AllowUsers Jan 10 00:12:56 host sshd[28083]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:56 host unix_chkpwd[28087]: password check failed for user (root) Jan 10 00:12:56 host sshd[28083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.190.192.238 user=root Jan 10 00:12:56 host sshd[28083]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:12:57 host sshd[28075]: Failed password for invalid user root from 165.22.181.245 port 45500 ssh2 Jan 10 00:12:57 host sshd[28075]: Received disconnect from 165.22.181.245 port 45500:11: Bye Bye [preauth] Jan 10 00:12:57 host sshd[28075]: Disconnected from 165.22.181.245 port 45500 [preauth] Jan 10 00:12:57 host sshd[28079]: Failed password for invalid user root from 84.201.159.27 port 33998 ssh2 Jan 10 00:12:57 host sshd[28079]: Received disconnect from 84.201.159.27 port 33998:11: Bye Bye [preauth] Jan 10 00:12:57 host sshd[28079]: Disconnected from 84.201.159.27 port 33998 [preauth] Jan 10 00:12:58 host sshd[28083]: Failed password for invalid user root from 20.190.192.238 port 42030 ssh2 Jan 10 00:12:58 host sshd[28083]: Received disconnect from 20.190.192.238 port 42030:11: Bye Bye [preauth] Jan 10 00:12:58 host sshd[28083]: Disconnected from 20.190.192.238 port 42030 [preauth] Jan 10 00:12:59 host sshd[28146]: User root from 211.21.113.128 not allowed because not listed in AllowUsers Jan 10 00:12:59 host sshd[28146]: input_userauth_request: invalid user root [preauth] Jan 10 00:12:59 host unix_chkpwd[28184]: password check failed for user (root) Jan 10 00:12:59 host sshd[28146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.21.113.128 user=root Jan 10 00:12:59 host sshd[28146]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:13:00 host sshd[28186]: User root from 128.199.212.131 not allowed because not listed in AllowUsers Jan 10 00:13:00 host sshd[28186]: input_userauth_request: invalid user root [preauth] Jan 10 00:13:00 host unix_chkpwd[28188]: password check failed for user (root) Jan 10 00:13:00 host sshd[28186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.212.131 user=root Jan 10 00:13:00 host sshd[28186]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:13:01 host sshd[28146]: Failed password for invalid user root from 211.21.113.128 port 59020 ssh2 Jan 10 00:13:01 host sshd[28146]: Received disconnect from 211.21.113.128 port 59020:11: Bye Bye [preauth] Jan 10 00:13:01 host sshd[28146]: Disconnected from 211.21.113.128 port 59020 [preauth] Jan 10 00:13:01 host sshd[28186]: Failed password for invalid user root from 128.199.212.131 port 40912 ssh2 Jan 10 00:13:01 host sshd[28186]: Received disconnect from 128.199.212.131 port 40912:11: Bye Bye [preauth] Jan 10 00:13:01 host sshd[28186]: Disconnected from 128.199.212.131 port 40912 [preauth] Jan 10 00:13:03 host sshd[28213]: User root from 134.209.103.60 not allowed because not listed in AllowUsers Jan 10 00:13:03 host sshd[28213]: input_userauth_request: invalid user root [preauth] Jan 10 00:13:03 host unix_chkpwd[28215]: password check failed for user (root) Jan 10 00:13:03 host sshd[28213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.103.60 user=root Jan 10 00:13:03 host sshd[28213]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:13:04 host sshd[28211]: User root from 146.190.127.135 not allowed because not listed in AllowUsers Jan 10 00:13:04 host sshd[28211]: input_userauth_request: invalid user root [preauth] Jan 10 00:13:04 host unix_chkpwd[28286]: password check failed for user (root) Jan 10 00:13:04 host sshd[28211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.127.135 user=root Jan 10 00:13:04 host sshd[28211]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:13:05 host sshd[28213]: Failed password for invalid user root from 134.209.103.60 port 58806 ssh2 Jan 10 00:13:06 host sshd[28211]: Failed password for invalid user root from 146.190.127.135 port 54978 ssh2 Jan 10 00:13:07 host sshd[28211]: Received disconnect from 146.190.127.135 port 54978:11: Bye Bye [preauth] Jan 10 00:13:07 host sshd[28211]: Disconnected from 146.190.127.135 port 54978 [preauth] Jan 10 00:13:08 host sshd[28317]: User root from 163.197.57.201 not allowed because not listed in AllowUsers Jan 10 00:13:08 host sshd[28317]: input_userauth_request: invalid user root [preauth] Jan 10 00:13:08 host unix_chkpwd[28321]: password check failed for user (root) Jan 10 00:13:08 host sshd[28317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.197.57.201 user=root Jan 10 00:13:08 host sshd[28317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:13:10 host sshd[28317]: Failed password for invalid user root from 163.197.57.201 port 34828 ssh2 Jan 10 00:13:10 host sshd[28317]: Received disconnect from 163.197.57.201 port 34828:11: Bye Bye [preauth] Jan 10 00:13:10 host sshd[28317]: Disconnected from 163.197.57.201 port 34828 [preauth] Jan 10 00:13:12 host sshd[28357]: Connection closed by 45.79.181.94 port 3288 [preauth] Jan 10 00:13:14 host sshd[28365]: User root from 170.64.138.123 not allowed because not listed in AllowUsers Jan 10 00:13:14 host sshd[28365]: input_userauth_request: invalid user root [preauth] Jan 10 00:13:14 host unix_chkpwd[28369]: password check failed for user (root) Jan 10 00:13:14 host sshd[28365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.138.123 user=root Jan 10 00:13:14 host sshd[28365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:13:14 host sshd[28363]: Connection closed by 45.79.181.94 port 3290 [preauth] Jan 10 00:13:15 host sshd[28371]: User root from 139.59.104.150 not allowed because not listed in AllowUsers Jan 10 00:13:15 host sshd[28371]: input_userauth_request: invalid user root [preauth] Jan 10 00:13:15 host unix_chkpwd[28376]: password check failed for user (root) Jan 10 00:13:15 host sshd[28371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.104.150 user=root Jan 10 00:13:15 host sshd[28371]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:13:16 host sshd[28370]: Connection closed by 45.79.181.94 port 3302 [preauth] Jan 10 00:13:16 host sshd[28365]: Failed password for invalid user root from 170.64.138.123 port 60614 ssh2 Jan 10 00:13:16 host sshd[28365]: Received disconnect from 170.64.138.123 port 60614:11: Bye Bye [preauth] Jan 10 00:13:16 host sshd[28365]: Disconnected from 170.64.138.123 port 60614 [preauth] Jan 10 00:13:17 host sshd[28371]: Failed password for invalid user root from 139.59.104.150 port 39562 ssh2 Jan 10 00:13:17 host sshd[28371]: Received disconnect from 139.59.104.150 port 39562:11: Bye Bye [preauth] Jan 10 00:13:17 host sshd[28371]: Disconnected from 139.59.104.150 port 39562 [preauth] Jan 10 00:13:17 host sshd[28379]: User root from 116.193.191.248 not allowed because not listed in AllowUsers Jan 10 00:13:17 host sshd[28379]: input_userauth_request: invalid user root [preauth] Jan 10 00:13:17 host unix_chkpwd[28382]: password check failed for user (root) Jan 10 00:13:17 host sshd[28379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.191.248 user=root Jan 10 00:13:17 host sshd[28379]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:13:19 host sshd[28379]: Failed password for invalid user root from 116.193.191.248 port 48686 ssh2 Jan 10 00:13:23 host sshd[28478]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 10 00:13:23 host sshd[28478]: input_userauth_request: invalid user root [preauth] Jan 10 00:13:23 host unix_chkpwd[28481]: password check failed for user (root) Jan 10 00:13:23 host sshd[28478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 10 00:13:23 host sshd[28478]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:13:25 host sshd[28478]: Failed password for invalid user root from 195.226.194.142 port 29504 ssh2 Jan 10 00:13:25 host sshd[28478]: Received disconnect from 195.226.194.142 port 29504:11: Bye Bye [preauth] Jan 10 00:13:25 host sshd[28478]: Disconnected from 195.226.194.142 port 29504 [preauth] Jan 10 00:13:37 host sshd[28524]: User root from 164.92.112.145 not allowed because not listed in AllowUsers Jan 10 00:13:37 host sshd[28524]: input_userauth_request: invalid user root [preauth] Jan 10 00:13:37 host unix_chkpwd[28528]: password check failed for user (root) Jan 10 00:13:37 host sshd[28524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.112.145 user=root Jan 10 00:13:37 host sshd[28524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:13:39 host sshd[28524]: Failed password for invalid user root from 164.92.112.145 port 52646 ssh2 Jan 10 00:13:47 host sshd[28573]: User root from 192.3.3.226 not allowed because not listed in AllowUsers Jan 10 00:13:47 host sshd[28573]: input_userauth_request: invalid user root [preauth] Jan 10 00:13:47 host unix_chkpwd[28579]: password check failed for user (root) Jan 10 00:13:47 host sshd[28573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.3.226 user=root Jan 10 00:13:47 host sshd[28573]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:13:49 host sshd[28573]: Failed password for invalid user root from 192.3.3.226 port 10400 ssh2 Jan 10 00:14:00 host sshd[28647]: User root from 45.118.147.188 not allowed because not listed in AllowUsers Jan 10 00:14:00 host sshd[28647]: input_userauth_request: invalid user root [preauth] Jan 10 00:14:00 host unix_chkpwd[28651]: password check failed for user (root) Jan 10 00:14:00 host sshd[28647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.118.147.188 user=root Jan 10 00:14:00 host sshd[28647]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:14:02 host sshd[28647]: Failed password for invalid user root from 45.118.147.188 port 39924 ssh2 Jan 10 00:14:02 host sshd[28647]: Received disconnect from 45.118.147.188 port 39924:11: Bye Bye [preauth] Jan 10 00:14:02 host sshd[28647]: Disconnected from 45.118.147.188 port 39924 [preauth] Jan 10 00:14:37 host sshd[28972]: User root from 128.199.208.187 not allowed because not listed in AllowUsers Jan 10 00:14:37 host sshd[28972]: input_userauth_request: invalid user root [preauth] Jan 10 00:14:37 host unix_chkpwd[28977]: password check failed for user (root) Jan 10 00:14:37 host sshd[28972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.208.187 user=root Jan 10 00:14:37 host sshd[28972]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:14:39 host sshd[28972]: Failed password for invalid user root from 128.199.208.187 port 51516 ssh2 Jan 10 00:14:43 host sshd[29116]: User root from 143.198.165.210 not allowed because not listed in AllowUsers Jan 10 00:14:43 host sshd[29116]: input_userauth_request: invalid user root [preauth] Jan 10 00:14:43 host unix_chkpwd[29140]: password check failed for user (root) Jan 10 00:14:43 host sshd[29116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.165.210 user=root Jan 10 00:14:43 host sshd[29116]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:14:45 host sshd[29116]: Failed password for invalid user root from 143.198.165.210 port 43340 ssh2 Jan 10 00:14:45 host sshd[29116]: Received disconnect from 143.198.165.210 port 43340:11: Bye Bye [preauth] Jan 10 00:14:45 host sshd[29116]: Disconnected from 143.198.165.210 port 43340 [preauth] Jan 10 00:15:08 host sshd[29487]: User root from 163.197.57.201 not allowed because not listed in AllowUsers Jan 10 00:15:08 host sshd[29487]: input_userauth_request: invalid user root [preauth] Jan 10 00:15:08 host unix_chkpwd[29510]: password check failed for user (root) Jan 10 00:15:08 host sshd[29487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.197.57.201 user=root Jan 10 00:15:08 host sshd[29487]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:15:10 host sshd[29487]: Failed password for invalid user root from 163.197.57.201 port 34754 ssh2 Jan 10 00:15:10 host sshd[29487]: Received disconnect from 163.197.57.201 port 34754:11: Bye Bye [preauth] Jan 10 00:15:10 host sshd[29487]: Disconnected from 163.197.57.201 port 34754 [preauth] Jan 10 00:16:41 host sshd[30111]: User root from 77.82.90.234 not allowed because not listed in AllowUsers Jan 10 00:16:41 host sshd[30111]: input_userauth_request: invalid user root [preauth] Jan 10 00:16:41 host unix_chkpwd[30115]: password check failed for user (root) Jan 10 00:16:41 host sshd[30111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.82.90.234 user=root Jan 10 00:16:41 host sshd[30111]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:16:44 host sshd[30111]: Failed password for invalid user root from 77.82.90.234 port 37692 ssh2 Jan 10 00:17:47 host sshd[30276]: User root from 13.40.100.6 not allowed because not listed in AllowUsers Jan 10 00:17:47 host sshd[30276]: input_userauth_request: invalid user root [preauth] Jan 10 00:17:47 host unix_chkpwd[30289]: password check failed for user (root) Jan 10 00:17:47 host sshd[30276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.40.100.6 user=root Jan 10 00:17:47 host sshd[30276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:17:50 host sshd[30276]: Failed password for invalid user root from 13.40.100.6 port 50990 ssh2 Jan 10 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=kottayamcalldriv user-19=phmetals user-20=palco123 user-21=gifterman user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=remysagr user-26=wwwkmaorg user-27=pmcresources user-28=shalinijames user-29=wwwtestugo user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 00:21:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gmd5NlehtocmJ2Up.~ Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gmd5NlehtocmJ2Up.~' Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gmd5NlehtocmJ2Up.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 00:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 00:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 00:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 00:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 00:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 00:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 00:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 00:22:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 00:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 00:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 00:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 00:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 00:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 00:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 00:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 00:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 00:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 00:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 00:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 00:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 00:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 00:22:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 00:22:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 00:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 00:22:25 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 00:22:26 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 00:35:25 host sshd[1016]: User root from 119.82.135.226 not allowed because not listed in AllowUsers Jan 10 00:35:25 host sshd[1016]: input_userauth_request: invalid user root [preauth] Jan 10 00:35:25 host unix_chkpwd[1020]: password check failed for user (root) Jan 10 00:35:25 host sshd[1016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.82.135.226 user=root Jan 10 00:35:25 host sshd[1016]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:35:26 host sshd[1016]: Failed password for invalid user root from 119.82.135.226 port 42764 ssh2 Jan 10 00:35:26 host sshd[1016]: Received disconnect from 119.82.135.226 port 42764:11: Bye Bye [preauth] Jan 10 00:35:26 host sshd[1016]: Disconnected from 119.82.135.226 port 42764 [preauth] Jan 10 00:35:30 host sshd[1050]: User root from 41.190.51.10 not allowed because not listed in AllowUsers Jan 10 00:35:30 host sshd[1050]: input_userauth_request: invalid user root [preauth] Jan 10 00:35:30 host unix_chkpwd[1057]: password check failed for user (root) Jan 10 00:35:30 host sshd[1050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.51.10 user=root Jan 10 00:35:30 host sshd[1050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:35:32 host sshd[1050]: Failed password for invalid user root from 41.190.51.10 port 46678 ssh2 Jan 10 00:35:32 host sshd[1050]: Received disconnect from 41.190.51.10 port 46678:11: Bye Bye [preauth] Jan 10 00:35:32 host sshd[1050]: Disconnected from 41.190.51.10 port 46678 [preauth] Jan 10 00:37:14 host sshd[1411]: User root from 119.82.135.226 not allowed because not listed in AllowUsers Jan 10 00:37:14 host sshd[1411]: input_userauth_request: invalid user root [preauth] Jan 10 00:37:14 host unix_chkpwd[1415]: password check failed for user (root) Jan 10 00:37:14 host sshd[1411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.82.135.226 user=root Jan 10 00:37:14 host sshd[1411]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:37:16 host sshd[1411]: Failed password for invalid user root from 119.82.135.226 port 58952 ssh2 Jan 10 00:37:17 host sshd[1411]: Received disconnect from 119.82.135.226 port 58952:11: Bye Bye [preauth] Jan 10 00:37:17 host sshd[1411]: Disconnected from 119.82.135.226 port 58952 [preauth] Jan 10 00:37:59 host sshd[1532]: Invalid user distccd from 104.244.74.6 port 47008 Jan 10 00:37:59 host sshd[1532]: input_userauth_request: invalid user distccd [preauth] Jan 10 00:37:59 host sshd[1532]: pam_unix(sshd:auth): check pass; user unknown Jan 10 00:37:59 host sshd[1532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 10 00:38:00 host sshd[1532]: Failed password for invalid user distccd from 104.244.74.6 port 47008 ssh2 Jan 10 00:38:00 host sshd[1532]: Connection closed by 104.244.74.6 port 47008 [preauth] Jan 10 00:39:00 host sshd[1661]: User root from 41.190.51.10 not allowed because not listed in AllowUsers Jan 10 00:39:00 host sshd[1661]: input_userauth_request: invalid user root [preauth] Jan 10 00:39:00 host unix_chkpwd[1668]: password check failed for user (root) Jan 10 00:39:00 host sshd[1661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.51.10 user=root Jan 10 00:39:00 host sshd[1661]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 00:39:02 host sshd[1661]: Failed password for invalid user root from 41.190.51.10 port 36417 ssh2 Jan 10 00:39:02 host sshd[1661]: Received disconnect from 41.190.51.10 port 36417:11: Bye Bye [preauth] Jan 10 00:39:02 host sshd[1661]: Disconnected from 41.190.51.10 port 36417 [preauth] Jan 10 00:41:55 host sshd[2246]: Invalid user distccd from 104.244.74.6 port 60572 Jan 10 00:41:55 host sshd[2246]: input_userauth_request: invalid user distccd [preauth] Jan 10 00:41:55 host sshd[2246]: pam_unix(sshd:auth): check pass; user unknown Jan 10 00:41:55 host sshd[2246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 10 00:41:58 host sshd[2246]: Failed password for invalid user distccd from 104.244.74.6 port 60572 ssh2 Jan 10 00:41:58 host sshd[2246]: Connection closed by 104.244.74.6 port 60572 [preauth] Jan 10 00:44:30 host sshd[2642]: Invalid user test from 195.226.194.142 port 53840 Jan 10 00:44:30 host sshd[2642]: input_userauth_request: invalid user test [preauth] Jan 10 00:44:30 host sshd[2642]: pam_unix(sshd:auth): check pass; user unknown Jan 10 00:44:30 host sshd[2642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 10 00:44:32 host sshd[2642]: Failed password for invalid user test from 195.226.194.142 port 53840 ssh2 Jan 10 00:44:33 host sshd[2642]: Received disconnect from 195.226.194.142 port 53840:11: Bye Bye [preauth] Jan 10 00:44:33 host sshd[2642]: Disconnected from 195.226.194.142 port 53840 [preauth] Jan 10 00:45:52 host sshd[2879]: Invalid user developer from 173.212.225.62 port 36904 Jan 10 00:45:52 host sshd[2879]: input_userauth_request: invalid user developer [preauth] Jan 10 00:45:52 host sshd[2879]: pam_unix(sshd:auth): check pass; user unknown Jan 10 00:45:52 host sshd[2879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 00:45:53 host sshd[2879]: Failed password for invalid user developer from 173.212.225.62 port 36904 ssh2 Jan 10 00:45:54 host sshd[2879]: Received disconnect from 173.212.225.62 port 36904:11: Bye Bye [preauth] Jan 10 00:45:54 host sshd[2879]: Disconnected from 173.212.225.62 port 36904 [preauth] Jan 10 00:54:46 host sshd[4389]: Invalid user bv from 194.110.203.109 port 32810 Jan 10 00:54:46 host sshd[4389]: input_userauth_request: invalid user bv [preauth] Jan 10 00:54:46 host sshd[4389]: pam_unix(sshd:auth): check pass; user unknown Jan 10 00:54:46 host sshd[4389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 00:54:47 host sshd[4389]: Failed password for invalid user bv from 194.110.203.109 port 32810 ssh2 Jan 10 00:54:50 host sshd[4389]: pam_unix(sshd:auth): check pass; user unknown Jan 10 00:54:53 host sshd[4389]: Failed password for invalid user bv from 194.110.203.109 port 32810 ssh2 Jan 10 00:54:56 host sshd[4389]: pam_unix(sshd:auth): check pass; user unknown Jan 10 00:54:58 host sshd[4389]: Failed password for invalid user bv from 194.110.203.109 port 32810 ssh2 Jan 10 00:55:02 host sshd[4389]: Connection closed by 194.110.203.109 port 32810 [preauth] Jan 10 00:55:02 host sshd[4389]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 01:04:30 host sshd[6091]: Invalid user ubnt from 37.44.238.144 port 44076 Jan 10 01:04:30 host sshd[6091]: input_userauth_request: invalid user ubnt [preauth] Jan 10 01:04:30 host sshd[6091]: pam_unix(sshd:auth): check pass; user unknown Jan 10 01:04:30 host sshd[6091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.238.144 Jan 10 01:04:31 host sshd[6091]: Failed password for invalid user ubnt from 37.44.238.144 port 44076 ssh2 Jan 10 01:04:31 host sshd[6091]: Received disconnect from 37.44.238.144 port 44076:11: Bye Bye [preauth] Jan 10 01:04:31 host sshd[6091]: Disconnected from 37.44.238.144 port 44076 [preauth] Jan 10 01:04:37 host sshd[6099]: User root from 37.44.238.144 not allowed because not listed in AllowUsers Jan 10 01:04:37 host sshd[6099]: input_userauth_request: invalid user root [preauth] Jan 10 01:04:37 host unix_chkpwd[6107]: password check failed for user (root) Jan 10 01:04:37 host sshd[6099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.238.144 user=root Jan 10 01:04:37 host sshd[6099]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 01:04:39 host sshd[6099]: Failed password for invalid user root from 37.44.238.144 port 52446 ssh2 Jan 10 01:04:39 host sshd[6099]: Received disconnect from 37.44.238.144 port 52446:11: Bye Bye [preauth] Jan 10 01:04:39 host sshd[6099]: Disconnected from 37.44.238.144 port 52446 [preauth] Jan 10 01:11:59 host sshd[7312]: Invalid user distccd from 104.244.74.6 port 37200 Jan 10 01:11:59 host sshd[7312]: input_userauth_request: invalid user distccd [preauth] Jan 10 01:11:59 host sshd[7312]: pam_unix(sshd:auth): check pass; user unknown Jan 10 01:11:59 host sshd[7312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 10 01:12:01 host sshd[7312]: Failed password for invalid user distccd from 104.244.74.6 port 37200 ssh2 Jan 10 01:12:57 host sshd[7448]: Invalid user admin from 195.226.194.242 port 62832 Jan 10 01:12:57 host sshd[7448]: input_userauth_request: invalid user admin [preauth] Jan 10 01:12:57 host sshd[7448]: pam_unix(sshd:auth): check pass; user unknown Jan 10 01:12:57 host sshd[7448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 10 01:12:59 host sshd[7448]: Failed password for invalid user admin from 195.226.194.242 port 62832 ssh2 Jan 10 01:13:00 host sshd[7448]: Received disconnect from 195.226.194.242 port 62832:11: Bye Bye [preauth] Jan 10 01:13:00 host sshd[7448]: Disconnected from 195.226.194.242 port 62832 [preauth] Jan 10 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=phmetals user-11=kottayamcalldriv user-12=palco123 user-13=gifterman user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 01:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aa1rPitahUV6Y121.~ Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aa1rPitahUV6Y121.~' Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aa1rPitahUV6Y121.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 01:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 01:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 01:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 01:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 01:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 01:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 01:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 01:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 01:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 01:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 01:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 01:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 01:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 01:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 01:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 01:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 01:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 01:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 01:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 01:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 01:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 01:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 01:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 01:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 01:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 01:28:22 host sshd[9760]: User root from 43.132.181.106 not allowed because not listed in AllowUsers Jan 10 01:28:22 host sshd[9760]: input_userauth_request: invalid user root [preauth] Jan 10 01:28:22 host unix_chkpwd[9762]: password check failed for user (root) Jan 10 01:28:22 host sshd[9760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.181.106 user=root Jan 10 01:28:22 host sshd[9760]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 01:28:25 host sshd[9760]: Failed password for invalid user root from 43.132.181.106 port 35480 ssh2 Jan 10 01:28:25 host sshd[9760]: Received disconnect from 43.132.181.106 port 35480:11: Bye Bye [preauth] Jan 10 01:28:25 host sshd[9760]: Disconnected from 43.132.181.106 port 35480 [preauth] Jan 10 01:30:42 host sshd[10039]: User root from 209.97.187.12 not allowed because not listed in AllowUsers Jan 10 01:30:42 host sshd[10039]: input_userauth_request: invalid user root [preauth] Jan 10 01:30:42 host unix_chkpwd[10042]: password check failed for user (root) Jan 10 01:30:42 host sshd[10039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.187.12 user=root Jan 10 01:30:42 host sshd[10039]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 01:30:44 host sshd[10039]: Failed password for invalid user root from 209.97.187.12 port 33544 ssh2 Jan 10 01:30:44 host sshd[10039]: Received disconnect from 209.97.187.12 port 33544:11: Bye Bye [preauth] Jan 10 01:30:44 host sshd[10039]: Disconnected from 209.97.187.12 port 33544 [preauth] Jan 10 01:32:35 host sshd[10226]: User root from 209.97.187.12 not allowed because not listed in AllowUsers Jan 10 01:32:35 host sshd[10226]: input_userauth_request: invalid user root [preauth] Jan 10 01:32:35 host unix_chkpwd[10229]: password check failed for user (root) Jan 10 01:32:35 host sshd[10226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.187.12 user=root Jan 10 01:32:35 host sshd[10226]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 01:32:37 host sshd[10226]: Failed password for invalid user root from 209.97.187.12 port 37310 ssh2 Jan 10 01:32:49 host sshd[10275]: User root from 43.132.181.106 not allowed because not listed in AllowUsers Jan 10 01:32:49 host sshd[10275]: input_userauth_request: invalid user root [preauth] Jan 10 01:32:49 host unix_chkpwd[10277]: password check failed for user (root) Jan 10 01:32:49 host sshd[10275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.132.181.106 user=root Jan 10 01:32:49 host sshd[10275]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 01:32:51 host sshd[10275]: Failed password for invalid user root from 43.132.181.106 port 51474 ssh2 Jan 10 01:34:15 host sshd[10574]: User root from 157.7.200.67 not allowed because not listed in AllowUsers Jan 10 01:34:15 host sshd[10574]: input_userauth_request: invalid user root [preauth] Jan 10 01:34:15 host unix_chkpwd[10576]: password check failed for user (root) Jan 10 01:34:15 host sshd[10574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.200.67 user=root Jan 10 01:34:15 host sshd[10574]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 01:34:18 host sshd[10574]: Failed password for invalid user root from 157.7.200.67 port 49484 ssh2 Jan 10 01:34:18 host sshd[10574]: Received disconnect from 157.7.200.67 port 49484:11: Bye Bye [preauth] Jan 10 01:34:18 host sshd[10574]: Disconnected from 157.7.200.67 port 49484 [preauth] Jan 10 01:36:12 host sshd[10931]: User root from 157.7.200.67 not allowed because not listed in AllowUsers Jan 10 01:36:12 host sshd[10931]: input_userauth_request: invalid user root [preauth] Jan 10 01:36:12 host unix_chkpwd[10934]: password check failed for user (root) Jan 10 01:36:12 host sshd[10931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.200.67 user=root Jan 10 01:36:12 host sshd[10931]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 01:36:14 host sshd[10931]: Failed password for invalid user root from 157.7.200.67 port 48664 ssh2 Jan 10 01:36:14 host sshd[10931]: Received disconnect from 157.7.200.67 port 48664:11: Bye Bye [preauth] Jan 10 01:36:14 host sshd[10931]: Disconnected from 157.7.200.67 port 48664 [preauth] Jan 10 01:38:20 host sshd[11261]: Invalid user jeremy from 107.189.30.59 port 39482 Jan 10 01:38:20 host sshd[11261]: input_userauth_request: invalid user jeremy [preauth] Jan 10 01:38:20 host sshd[11261]: pam_unix(sshd:auth): check pass; user unknown Jan 10 01:38:20 host sshd[11261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 10 01:38:22 host sshd[11261]: Failed password for invalid user jeremy from 107.189.30.59 port 39482 ssh2 Jan 10 01:38:23 host sshd[11261]: Connection closed by 107.189.30.59 port 39482 [preauth] Jan 10 01:59:37 host sshd[14450]: Invalid user developer from 173.212.225.62 port 54178 Jan 10 01:59:37 host sshd[14450]: input_userauth_request: invalid user developer [preauth] Jan 10 01:59:37 host sshd[14450]: pam_unix(sshd:auth): check pass; user unknown Jan 10 01:59:37 host sshd[14450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 01:59:39 host sshd[14450]: Failed password for invalid user developer from 173.212.225.62 port 54178 ssh2 Jan 10 01:59:39 host sshd[14450]: Received disconnect from 173.212.225.62 port 54178:11: Bye Bye [preauth] Jan 10 01:59:39 host sshd[14450]: Disconnected from 173.212.225.62 port 54178 [preauth] Jan 10 02:11:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:11:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:11:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:11:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:11:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:11:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:11:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:11:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:17:03 host sshd[17219]: Connection closed by 198.199.103.199 port 33832 [preauth] Jan 10 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwrmswll user-2=keralaholi user-3=wwwresourcehunte user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=wwwnexidigital user-13=mrsclean user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=wwwtestugo user-25=shalinijames user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 02:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wRz82tDEW9sfhZub.~ Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wRz82tDEW9sfhZub.~' Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wRz82tDEW9sfhZub.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 02:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 02:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 02:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 02:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 02:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 02:22:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:22:14 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 02:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:22:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 02:22:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:22:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 02:22:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:22:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:22:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 02:22:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:22:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 02:22:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:22:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:22:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 02:22:30 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:22:31 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:29:41 host sshd[19136]: User root from 104.236.1.60 not allowed because not listed in AllowUsers Jan 10 02:29:41 host sshd[19136]: input_userauth_request: invalid user root [preauth] Jan 10 02:29:41 host unix_chkpwd[19139]: password check failed for user (root) Jan 10 02:29:41 host sshd[19136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.1.60 user=root Jan 10 02:29:41 host sshd[19136]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 02:29:43 host sshd[19136]: Failed password for invalid user root from 104.236.1.60 port 38918 ssh2 Jan 10 02:29:43 host sshd[19136]: Received disconnect from 104.236.1.60 port 38918:11: Bye Bye [preauth] Jan 10 02:29:43 host sshd[19136]: Disconnected from 104.236.1.60 port 38918 [preauth] Jan 10 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=phmetals user-15=kottayamcalldriv user-16=palco123 user-17=gifterman user-18=straightcurve user-19=wwwletsstalkfood user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=shalinijames user-24=wwwtestugo user-25=vfmassets user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 02:29:54 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 10 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true Jan 10 02:29:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 02:30:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 10 02:30:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 02:30:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 02:30:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 10 02:30:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 02:30:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:30:04 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 02:30:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 10 02:30:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:30:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 10 02:30:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:30:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:30:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 10 02:30:05 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 02:30:06 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 02:30:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 10 02:30:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:30:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:30:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true Jan 10 02:30:06 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:30:36 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 10 02:30:36 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:30:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 10 02:30:38 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:30:49 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:30:49 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:30:49 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 10 02:30:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:30:49 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 10 02:30:49 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:30:49 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:30:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 10 02:30:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:30:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 10 02:30:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:30:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 10 02:30:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:30:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 10 02:30:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:30:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:30:50 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:30:51 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:30:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 10 02:30:51 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:30:53 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:30:53 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:30:55 host sshd[19499]: User root from 13.232.230.62 not allowed because not listed in AllowUsers Jan 10 02:30:55 host sshd[19499]: input_userauth_request: invalid user root [preauth] Jan 10 02:30:55 host unix_chkpwd[19501]: password check failed for user (root) Jan 10 02:30:55 host sshd[19499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.232.230.62 user=root Jan 10 02:30:55 host sshd[19499]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 02:30:57 host sshd[19499]: Failed password for invalid user root from 13.232.230.62 port 33574 ssh2 Jan 10 02:30:57 host sshd[19499]: Received disconnect from 13.232.230.62 port 33574:11: Bye Bye [preauth] Jan 10 02:30:57 host sshd[19499]: Disconnected from 13.232.230.62 port 33574 [preauth] Jan 10 02:31:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 10 02:31:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Jan 10 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:10 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:31:10 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance Jan 10 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get Jan 10 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 10 02:31:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:31:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 10 02:31:12 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 10 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:13 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 02:31:13 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure Jan 10 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Jan 10 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php Jan 10 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:17 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled Jan 10 02:31:17 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:18 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct Jan 10 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 02:31:19 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true Jan 10 02:31:20 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:31:34 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Jan 10 02:31:34 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:31:35 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Jan 10 02:31:35 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:31:35 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:31:35 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:31:35 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 10 02:31:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:31:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 10 02:31:35 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:31:36 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 10 02:31:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:31:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 10 02:31:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:31:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:31:36 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:31:38 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Jan 10 02:31:39 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:31:39 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:31:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:31:39 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Jan 10 02:32:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Jan 10 02:32:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance Jan 10 02:32:07 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get Jan 10 02:32:07 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 10 02:32:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:32:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:32:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:07 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 10 02:32:08 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 10 02:32:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 02:32:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 02:32:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:10 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure Jan 10 02:32:10 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:10 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:10 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Jan 10 02:32:11 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php Jan 10 02:32:11 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled Jan 10 02:32:11 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:11 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:12 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct Jan 10 02:32:12 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:32:12 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 10 02:32:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:32:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true Jan 10 02:32:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Jan 10 02:32:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Jan 10 02:32:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:32:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 10 02:32:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:32:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json Jan 10 02:32:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 10 02:32:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:32:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 10 02:32:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:32:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:32:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Jan 10 02:32:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:32:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Jan 10 02:32:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Jan 10 02:32:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance Jan 10 02:32:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get Jan 10 02:32:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 10 02:32:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:32:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 10 02:32:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:39 host sshd[20327]: User root from 111.61.107.27 not allowed because not listed in AllowUsers Jan 10 02:32:39 host sshd[20327]: input_userauth_request: invalid user root [preauth] Jan 10 02:32:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:39 host unix_chkpwd[20386]: password check failed for user (root) Jan 10 02:32:39 host sshd[20327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.61.107.27 user=root Jan 10 02:32:39 host sshd[20327]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 10 02:32:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:39 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 02:32:39 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 02:32:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:40 host sshd[20409]: User root from 13.232.230.62 not allowed because not listed in AllowUsers Jan 10 02:32:40 host sshd[20409]: input_userauth_request: invalid user root [preauth] Jan 10 02:32:40 host unix_chkpwd[20411]: password check failed for user (root) Jan 10 02:32:40 host sshd[20409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.232.230.62 user=root Jan 10 02:32:40 host sshd[20409]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 02:32:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure Jan 10 02:32:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:41 host sshd[20327]: Failed password for invalid user root from 111.61.107.27 port 38918 ssh2 Jan 10 02:32:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Jan 10 02:32:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php Jan 10 02:32:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled Jan 10 02:32:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct Jan 10 02:32:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:42 host sshd[20327]: Received disconnect from 111.61.107.27 port 38918:11: Bye Bye [preauth] Jan 10 02:32:42 host sshd[20327]: Disconnected from 111.61.107.27 port 38918 [preauth] Jan 10 02:32:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true Jan 10 02:32:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:43 host sshd[20409]: Failed password for invalid user root from 13.232.230.62 port 52828 ssh2 Jan 10 02:32:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Jan 10 02:32:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Jan 10 02:32:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:32:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json Jan 10 02:32:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:32:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Jan 10 02:32:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:32:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Jan 10 02:32:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Jan 10 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance Jan 10 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get Jan 10 02:32:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 10 02:32:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:32:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:56 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 10 02:32:56 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 10 02:32:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 02:32:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:57 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 02:32:57 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure Jan 10 02:32:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Jan 10 02:32:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php Jan 10 02:32:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled Jan 10 02:32:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:32:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:32:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct Jan 10 02:33:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true Jan 10 02:33:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:04 host sshd[20717]: User root from 104.236.1.60 not allowed because not listed in AllowUsers Jan 10 02:33:04 host sshd[20717]: input_userauth_request: invalid user root [preauth] Jan 10 02:33:04 host unix_chkpwd[20722]: password check failed for user (root) Jan 10 02:33:04 host sshd[20717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.1.60 user=root Jan 10 02:33:04 host sshd[20717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 02:33:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Jan 10 02:33:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:07 host sshd[20717]: Failed password for invalid user root from 104.236.1.60 port 37518 ssh2 Jan 10 02:33:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Jan 10 02:33:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:07 host sshd[20717]: Received disconnect from 104.236.1.60 port 37518:11: Bye Bye [preauth] Jan 10 02:33:07 host sshd[20717]: Disconnected from 104.236.1.60 port 37518 [preauth] Jan 10 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:33:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json Jan 10 02:33:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:33:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Jan 10 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:33:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Jan 10 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 10 02:33:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance Jan 10 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get Jan 10 02:33:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 10 02:33:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:33:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 10 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 10 02:33:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 02:33:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure Jan 10 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:33:20 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 10 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 10 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled Jan 10 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:33:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct Jan 10 02:33:22 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:33:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 10 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true Jan 10 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 10 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true Jan 10 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Jan 10 02:33:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Jan 10 02:33:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:33:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json Jan 10 02:33:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:33:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:37 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Jan 10 02:33:37 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:37 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:33:37 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:42 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Jan 10 02:33:42 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:42 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 10 02:33:42 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:42 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:33:42 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance Jan 10 02:33:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get Jan 10 02:33:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 10 02:33:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:33:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:33:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:44 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 10 02:33:44 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:44 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 10 02:33:44 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 02:33:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 02:33:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure Jan 10 02:33:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:33:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 10 02:33:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 10 02:33:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled Jan 10 02:33:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:33:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct Jan 10 02:33:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true Jan 10 02:33:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Jan 10 02:33:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Jan 10 02:33:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:33:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json Jan 10 02:33:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:53 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:33:53 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Jan 10 02:33:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:54 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:33:54 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Jan 10 02:33:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Jan 10 02:33:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:33:56 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:56 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance Jan 10 02:33:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get Jan 10 02:33:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 10 02:33:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:33:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:33:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:33:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 10 02:33:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 10 02:33:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:33:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:33:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 02:33:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:34:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 02:34:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:34:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure Jan 10 02:34:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:34:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:34:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:34:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Jan 10 02:34:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:34:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php Jan 10 02:34:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:34:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled Jan 10 02:34:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:34:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:34:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:34:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct Jan 10 02:34:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:34:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 10 02:34:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true Jan 10 02:34:02 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 10 02:34:02 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 10 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 10 02:34:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 10 02:34:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php Jan 10 02:34:03 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 10 02:34:03 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 10 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:34:03 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 10 02:34:03 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 10 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 10 02:34:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 10 02:34:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true Jan 10 02:34:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:12 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 10 02:34:13 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:13 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 10 02:34:13 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:19 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:34:19 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:19 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 10 02:34:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 10 02:34:19 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:20 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 10 02:34:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 10 02:34:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:34:20 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:21 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 10 02:34:21 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:21 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:34:21 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:27 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 10 02:34:27 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:32 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Jan 10 02:34:32 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:32 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:34:32 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:33 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance Jan 10 02:34:33 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:33 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get Jan 10 02:34:33 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:33 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 10 02:34:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:34:33 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:34 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major Jan 10 02:34:34 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:34 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 10 02:34:35 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:35 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 10 02:34:35 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:36 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure Jan 10 02:34:36 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:36 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:34:36 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:37 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Jan 10 02:34:37 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:37 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php Jan 10 02:34:37 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:37 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled Jan 10 02:34:37 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:37 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:34:37 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:38 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct Jan 10 02:34:38 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:34:38 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:34:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 10 02:34:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true Jan 10 02:34:38 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:45 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Jan 10 02:34:45 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:45 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Jan 10 02:34:45 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:46 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 10 02:34:46 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:46 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 10 02:34:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 10 02:34:46 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:46 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 10 02:34:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 10 02:34:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:34:47 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:47 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Jan 10 02:34:47 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:47 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 10 02:34:47 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:52 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Jan 10 02:34:52 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:53 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Jan 10 02:34:53 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:53 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:34:53 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:53 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance Jan 10 02:34:53 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:53 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get Jan 10 02:34:53 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:53 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 10 02:34:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:34:54 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:54 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 10 02:34:54 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:55 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 10 02:34:55 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:55 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 02:34:55 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:55 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 02:34:55 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure Jan 10 02:34:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:34:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Jan 10 02:34:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php Jan 10 02:34:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:56 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled Jan 10 02:34:56 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:57 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 10 02:34:57 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:57 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct Jan 10 02:34:57 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:34:57 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:34:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "Elementor" on Panlys (https://www.panlys.com). Installed version: 3.2.4. Available version: 3.10.0.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 Jan 10 02:34:57 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in Jan 10 02:34:57 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` Jan 10 02:34:57 host sudo: wp-toolkit : (command continued) file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json Jan 10 02:34:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:34:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:34:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear Jan 10 02:34:58 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 02:34:58 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 02:34:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear Jan 10 02:34:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:34:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:34:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear Jan 10 02:34:58 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 02:34:58 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 02:34:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear Jan 10 02:34:58 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 02:34:58 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 02:34:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear Jan 10 02:34:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:34:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:34:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear Jan 10 02:34:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:34:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:34:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear Jan 10 02:34:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:34:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:34:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear Jan 10 02:34:59 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:34:59 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:34:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear Jan 10 02:34:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:34:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:34:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear Jan 10 02:34:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:34:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:34:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear Jan 10 02:34:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:35:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear Jan 10 02:35:00 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 10 02:35:00 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 10 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear Jan 10 02:35:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:35:00 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear Jan 10 02:35:00 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:35:00 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 10 02:35:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 02:35:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 02:35:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 10 02:35:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 02:35:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 02:35:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 10 02:35:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 02:35:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 10 02:35:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:35:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 10 02:35:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:35:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 10 02:35:03 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 02:35:03 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 10 02:35:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:35:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:35:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 10 02:35:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 02:35:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 02:35:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 10 02:35:04 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 02:35:05 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 02:35:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 10 02:35:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 02:35:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 02:35:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 10 02:35:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:35:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 02:35:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 02:41:38 host sshd[23365]: User root from 111.61.107.27 not allowed because not listed in AllowUsers Jan 10 02:41:38 host sshd[23365]: input_userauth_request: invalid user root [preauth] Jan 10 02:41:38 host unix_chkpwd[23370]: password check failed for user (root) Jan 10 02:41:38 host sshd[23365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.61.107.27 user=root Jan 10 02:41:38 host sshd[23365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 02:41:40 host sshd[23365]: Failed password for invalid user root from 111.61.107.27 port 47533 ssh2 Jan 10 02:41:41 host sshd[23365]: Received disconnect from 111.61.107.27 port 47533:11: Bye Bye [preauth] Jan 10 02:41:41 host sshd[23365]: Disconnected from 111.61.107.27 port 47533 [preauth] Jan 10 02:57:46 host sshd[25569]: Invalid user bw from 194.110.203.109 port 35788 Jan 10 02:57:46 host sshd[25569]: input_userauth_request: invalid user bw [preauth] Jan 10 02:57:46 host sshd[25569]: pam_unix(sshd:auth): check pass; user unknown Jan 10 02:57:46 host sshd[25569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 02:57:48 host sshd[25569]: Failed password for invalid user bw from 194.110.203.109 port 35788 ssh2 Jan 10 02:57:51 host sshd[25569]: pam_unix(sshd:auth): check pass; user unknown Jan 10 02:57:53 host sshd[25569]: Failed password for invalid user bw from 194.110.203.109 port 35788 ssh2 Jan 10 02:57:56 host sshd[25569]: pam_unix(sshd:auth): check pass; user unknown Jan 10 02:57:59 host sshd[25569]: Failed password for invalid user bw from 194.110.203.109 port 35788 ssh2 Jan 10 02:58:02 host sshd[25569]: Connection closed by 194.110.203.109 port 35788 [preauth] Jan 10 02:58:02 host sshd[25569]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 02:59:41 host sshd[25933]: Bad protocol version identification '\003' from 194.165.16.71 port 21729 Jan 10 02:59:41 host sshd[25934]: Bad protocol version identification '\003' from 194.165.16.71 port 27626 Jan 10 03:00:55 host sshd[26112]: User root from 185.185.82.18 not allowed because not listed in AllowUsers Jan 10 03:00:55 host sshd[26112]: input_userauth_request: invalid user root [preauth] Jan 10 03:00:55 host unix_chkpwd[26115]: password check failed for user (root) Jan 10 03:00:55 host sshd[26112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.185.82.18 user=root Jan 10 03:00:55 host sshd[26112]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:00:57 host sshd[26112]: Failed password for invalid user root from 185.185.82.18 port 54036 ssh2 Jan 10 03:00:57 host sshd[26112]: Received disconnect from 185.185.82.18 port 54036:11: Bye Bye [preauth] Jan 10 03:00:57 host sshd[26112]: Disconnected from 185.185.82.18 port 54036 [preauth] Jan 10 03:06:09 host sshd[26912]: User root from 185.185.82.18 not allowed because not listed in AllowUsers Jan 10 03:06:09 host sshd[26912]: input_userauth_request: invalid user root [preauth] Jan 10 03:06:09 host unix_chkpwd[26919]: password check failed for user (root) Jan 10 03:06:09 host sshd[26912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.185.82.18 user=root Jan 10 03:06:09 host sshd[26912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:06:11 host sshd[26912]: Failed password for invalid user root from 185.185.82.18 port 48192 ssh2 Jan 10 03:06:11 host sshd[26912]: Received disconnect from 185.185.82.18 port 48192:11: Bye Bye [preauth] Jan 10 03:06:11 host sshd[26912]: Disconnected from 185.185.82.18 port 48192 [preauth] Jan 10 03:07:21 host sshd[27101]: Bad protocol version identification '\003' from 185.73.124.50 port 64600 Jan 10 03:11:24 host sshd[27698]: ssh_dispatch_run_fatal: Connection from 207.229.167.36 port 55686: Connection corrupted [preauth] Jan 10 03:13:19 host sshd[27920]: Invalid user developer from 173.212.225.62 port 43148 Jan 10 03:13:19 host sshd[27920]: input_userauth_request: invalid user developer [preauth] Jan 10 03:13:19 host sshd[27920]: pam_unix(sshd:auth): check pass; user unknown Jan 10 03:13:19 host sshd[27920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 03:13:21 host sshd[27920]: Failed password for invalid user developer from 173.212.225.62 port 43148 ssh2 Jan 10 03:13:21 host sshd[27920]: Received disconnect from 173.212.225.62 port 43148:11: Bye Bye [preauth] Jan 10 03:13:21 host sshd[27920]: Disconnected from 173.212.225.62 port 43148 [preauth] Jan 10 03:16:15 host sshd[28514]: User root from 43.135.130.122 not allowed because not listed in AllowUsers Jan 10 03:16:15 host sshd[28514]: input_userauth_request: invalid user root [preauth] Jan 10 03:16:15 host unix_chkpwd[28523]: password check failed for user (root) Jan 10 03:16:15 host sshd[28514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.130.122 user=root Jan 10 03:16:15 host sshd[28514]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:16:18 host sshd[28514]: Failed password for invalid user root from 43.135.130.122 port 48304 ssh2 Jan 10 03:16:18 host sshd[28514]: Received disconnect from 43.135.130.122 port 48304:11: Bye Bye [preauth] Jan 10 03:16:18 host sshd[28514]: Disconnected from 43.135.130.122 port 48304 [preauth] Jan 10 03:16:36 host sshd[28585]: User root from 188.166.30.235 not allowed because not listed in AllowUsers Jan 10 03:16:36 host sshd[28585]: input_userauth_request: invalid user root [preauth] Jan 10 03:16:36 host unix_chkpwd[28588]: password check failed for user (root) Jan 10 03:16:36 host sshd[28585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.30.235 user=root Jan 10 03:16:36 host sshd[28585]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:16:38 host sshd[28585]: Failed password for invalid user root from 188.166.30.235 port 60052 ssh2 Jan 10 03:16:38 host sshd[28585]: Received disconnect from 188.166.30.235 port 60052:11: Bye Bye [preauth] Jan 10 03:16:38 host sshd[28585]: Disconnected from 188.166.30.235 port 60052 [preauth] Jan 10 03:16:44 host sshd[28607]: User root from 37.44.238.78 not allowed because not listed in AllowUsers Jan 10 03:16:44 host sshd[28607]: input_userauth_request: invalid user root [preauth] Jan 10 03:16:44 host unix_chkpwd[28609]: password check failed for user (root) Jan 10 03:16:44 host sshd[28607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.238.78 user=root Jan 10 03:16:44 host sshd[28607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:16:45 host sshd[28607]: Failed password for invalid user root from 37.44.238.78 port 50386 ssh2 Jan 10 03:16:45 host sshd[28607]: Received disconnect from 37.44.238.78 port 50386:11: Normal Shutdown, Thank you for playing [preauth] Jan 10 03:16:45 host sshd[28607]: Disconnected from 37.44.238.78 port 50386 [preauth] Jan 10 03:17:14 host sshd[28663]: User root from 178.154.225.109 not allowed because not listed in AllowUsers Jan 10 03:17:14 host sshd[28663]: input_userauth_request: invalid user root [preauth] Jan 10 03:17:14 host unix_chkpwd[28674]: password check failed for user (root) Jan 10 03:17:14 host sshd[28663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.154.225.109 user=root Jan 10 03:17:14 host sshd[28663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:17:15 host sshd[28663]: Failed password for invalid user root from 178.154.225.109 port 39490 ssh2 Jan 10 03:17:16 host sshd[28663]: Received disconnect from 178.154.225.109 port 39490:11: Bye Bye [preauth] Jan 10 03:17:16 host sshd[28663]: Disconnected from 178.154.225.109 port 39490 [preauth] Jan 10 03:17:21 host sshd[28707]: User root from 51.250.81.245 not allowed because not listed in AllowUsers Jan 10 03:17:21 host sshd[28707]: input_userauth_request: invalid user root [preauth] Jan 10 03:17:21 host unix_chkpwd[28710]: password check failed for user (root) Jan 10 03:17:21 host sshd[28707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.81.245 user=root Jan 10 03:17:21 host sshd[28707]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:17:24 host sshd[28707]: Failed password for invalid user root from 51.250.81.245 port 51436 ssh2 Jan 10 03:17:24 host sshd[28707]: Received disconnect from 51.250.81.245 port 51436:11: Bye Bye [preauth] Jan 10 03:17:24 host sshd[28707]: Disconnected from 51.250.81.245 port 51436 [preauth] Jan 10 03:19:18 host sshd[28921]: User root from 103.111.250.87 not allowed because not listed in AllowUsers Jan 10 03:19:18 host sshd[28921]: input_userauth_request: invalid user root [preauth] Jan 10 03:19:18 host unix_chkpwd[28924]: password check failed for user (root) Jan 10 03:19:18 host sshd[28921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.111.250.87 user=root Jan 10 03:19:18 host sshd[28921]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:19:20 host sshd[28921]: Failed password for invalid user root from 103.111.250.87 port 53278 ssh2 Jan 10 03:19:20 host sshd[28921]: Received disconnect from 103.111.250.87 port 53278:11: Bye Bye [preauth] Jan 10 03:19:20 host sshd[28921]: Disconnected from 103.111.250.87 port 53278 [preauth] Jan 10 03:21:14 host sshd[29342]: User root from 138.3.246.118 not allowed because not listed in AllowUsers Jan 10 03:21:14 host sshd[29342]: input_userauth_request: invalid user root [preauth] Jan 10 03:21:14 host unix_chkpwd[29350]: password check failed for user (root) Jan 10 03:21:14 host sshd[29342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.3.246.118 user=root Jan 10 03:21:14 host sshd[29342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:21:17 host sshd[29342]: Failed password for invalid user root from 138.3.246.118 port 35512 ssh2 Jan 10 03:21:17 host sshd[29342]: Received disconnect from 138.3.246.118 port 35512:11: Bye Bye [preauth] Jan 10 03:21:17 host sshd[29342]: Disconnected from 138.3.246.118 port 35512 [preauth] Jan 10 03:21:21 host sshd[29370]: User root from 188.166.30.235 not allowed because not listed in AllowUsers Jan 10 03:21:21 host sshd[29370]: input_userauth_request: invalid user root [preauth] Jan 10 03:21:21 host unix_chkpwd[29376]: password check failed for user (root) Jan 10 03:21:21 host sshd[29370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.30.235 user=root Jan 10 03:21:21 host sshd[29370]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:21:22 host sshd[29370]: Failed password for invalid user root from 188.166.30.235 port 55654 ssh2 Jan 10 03:21:23 host sshd[29370]: Received disconnect from 188.166.30.235 port 55654:11: Bye Bye [preauth] Jan 10 03:21:23 host sshd[29370]: Disconnected from 188.166.30.235 port 55654 [preauth] Jan 10 03:21:40 host sshd[29475]: User root from 51.250.81.245 not allowed because not listed in AllowUsers Jan 10 03:21:40 host sshd[29475]: input_userauth_request: invalid user root [preauth] Jan 10 03:21:40 host unix_chkpwd[29478]: password check failed for user (root) Jan 10 03:21:40 host sshd[29475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.81.245 user=root Jan 10 03:21:40 host sshd[29475]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:21:42 host sshd[29475]: Failed password for invalid user root from 51.250.81.245 port 42946 ssh2 Jan 10 03:21:42 host sshd[29475]: Received disconnect from 51.250.81.245 port 42946:11: Bye Bye [preauth] Jan 10 03:21:42 host sshd[29475]: Disconnected from 51.250.81.245 port 42946 [preauth] Jan 10 03:21:48 host sshd[29525]: User root from 104.248.150.150 not allowed because not listed in AllowUsers Jan 10 03:21:48 host sshd[29525]: input_userauth_request: invalid user root [preauth] Jan 10 03:21:48 host unix_chkpwd[29527]: password check failed for user (root) Jan 10 03:21:48 host sshd[29525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.150.150 user=root Jan 10 03:21:48 host sshd[29525]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:21:50 host sshd[29525]: Failed password for invalid user root from 104.248.150.150 port 52778 ssh2 Jan 10 03:21:50 host sshd[29525]: Received disconnect from 104.248.150.150 port 52778:11: Bye Bye [preauth] Jan 10 03:21:50 host sshd[29525]: Disconnected from 104.248.150.150 port 52778 [preauth] Jan 10 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=palco123 user-4=gifterman user-5=phmetals user-6=kottayamcalldriv user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=woodpeck user-16=wwwkapin user-17=disposeat user-18=remysagr user-19=wwwkmaorg user-20=keralaholi user-21=wwwresourcehunte user-22=wwwrmswll user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 03:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hDOU6hlz8Mowudqy.~ Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hDOU6hlz8Mowudqy.~' Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hDOU6hlz8Mowudqy.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 03:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 03:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 03:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 03:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 03:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 03:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 03:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 03:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 03:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 03:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 03:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 03:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 03:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 03:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 03:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 03:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 03:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 03:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 03:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 03:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 03:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 03:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 03:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 03:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 03:22:26 host sshd[29802]: User root from 178.154.225.109 not allowed because not listed in AllowUsers Jan 10 03:22:26 host sshd[29802]: input_userauth_request: invalid user root [preauth] Jan 10 03:22:26 host unix_chkpwd[29806]: password check failed for user (root) Jan 10 03:22:26 host sshd[29802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.154.225.109 user=root Jan 10 03:22:26 host sshd[29802]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:22:28 host sshd[29802]: Failed password for invalid user root from 178.154.225.109 port 60654 ssh2 Jan 10 03:22:28 host sshd[29802]: Received disconnect from 178.154.225.109 port 60654:11: Bye Bye [preauth] Jan 10 03:22:28 host sshd[29802]: Disconnected from 178.154.225.109 port 60654 [preauth] Jan 10 03:22:33 host sshd[29868]: User root from 210.114.1.46 not allowed because not listed in AllowUsers Jan 10 03:22:33 host sshd[29868]: input_userauth_request: invalid user root [preauth] Jan 10 03:22:33 host unix_chkpwd[29873]: password check failed for user (root) Jan 10 03:22:33 host sshd[29868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.114.1.46 user=root Jan 10 03:22:33 host sshd[29868]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:22:35 host sshd[29868]: Failed password for invalid user root from 210.114.1.46 port 37570 ssh2 Jan 10 03:22:35 host sshd[29868]: Received disconnect from 210.114.1.46 port 37570:11: Bye Bye [preauth] Jan 10 03:22:35 host sshd[29868]: Disconnected from 210.114.1.46 port 37570 [preauth] Jan 10 03:22:51 host sshd[29914]: User root from 138.3.246.118 not allowed because not listed in AllowUsers Jan 10 03:22:51 host sshd[29914]: input_userauth_request: invalid user root [preauth] Jan 10 03:22:51 host unix_chkpwd[29917]: password check failed for user (root) Jan 10 03:22:51 host sshd[29914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.3.246.118 user=root Jan 10 03:22:51 host sshd[29914]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:22:54 host sshd[29914]: Failed password for invalid user root from 138.3.246.118 port 44656 ssh2 Jan 10 03:22:54 host sshd[29914]: Received disconnect from 138.3.246.118 port 44656:11: Bye Bye [preauth] Jan 10 03:22:54 host sshd[29914]: Disconnected from 138.3.246.118 port 44656 [preauth] Jan 10 03:23:48 host sshd[30084]: User root from 103.111.250.87 not allowed because not listed in AllowUsers Jan 10 03:23:48 host sshd[30084]: input_userauth_request: invalid user root [preauth] Jan 10 03:23:48 host unix_chkpwd[30088]: password check failed for user (root) Jan 10 03:23:48 host sshd[30084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.111.250.87 user=root Jan 10 03:23:48 host sshd[30084]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:23:50 host sshd[30084]: Failed password for invalid user root from 103.111.250.87 port 43474 ssh2 Jan 10 03:23:56 host sshd[30139]: User root from 43.135.130.122 not allowed because not listed in AllowUsers Jan 10 03:23:56 host sshd[30139]: input_userauth_request: invalid user root [preauth] Jan 10 03:23:57 host unix_chkpwd[30144]: password check failed for user (root) Jan 10 03:23:57 host sshd[30139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.130.122 user=root Jan 10 03:23:57 host sshd[30139]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:23:58 host sshd[30139]: Failed password for invalid user root from 43.135.130.122 port 48940 ssh2 Jan 10 03:23:59 host sshd[30139]: Received disconnect from 43.135.130.122 port 48940:11: Bye Bye [preauth] Jan 10 03:23:59 host sshd[30139]: Disconnected from 43.135.130.122 port 48940 [preauth] Jan 10 03:24:33 host sshd[30294]: User root from 104.248.150.150 not allowed because not listed in AllowUsers Jan 10 03:24:33 host sshd[30294]: input_userauth_request: invalid user root [preauth] Jan 10 03:24:33 host unix_chkpwd[30296]: password check failed for user (root) Jan 10 03:24:33 host sshd[30294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.150.150 user=root Jan 10 03:24:33 host sshd[30294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:24:35 host sshd[30294]: Failed password for invalid user root from 104.248.150.150 port 60370 ssh2 Jan 10 03:25:11 host sshd[30533]: User root from 210.114.1.46 not allowed because not listed in AllowUsers Jan 10 03:25:11 host sshd[30533]: input_userauth_request: invalid user root [preauth] Jan 10 03:25:11 host unix_chkpwd[30539]: password check failed for user (root) Jan 10 03:25:11 host sshd[30533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.114.1.46 user=root Jan 10 03:25:11 host sshd[30533]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:25:13 host sshd[30533]: Failed password for invalid user root from 210.114.1.46 port 43212 ssh2 Jan 10 03:25:13 host sshd[30533]: Received disconnect from 210.114.1.46 port 43212:11: Bye Bye [preauth] Jan 10 03:25:13 host sshd[30533]: Disconnected from 210.114.1.46 port 43212 [preauth] Jan 10 03:29:49 host sshd[31450]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 138.68.208.11 port 52722 Jan 10 03:44:18 host sshd[1419]: Invalid user admin from 195.226.194.242 port 50238 Jan 10 03:44:18 host sshd[1419]: input_userauth_request: invalid user admin [preauth] Jan 10 03:44:18 host sshd[1419]: pam_unix(sshd:auth): check pass; user unknown Jan 10 03:44:18 host sshd[1419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 10 03:44:20 host sshd[1419]: Failed password for invalid user admin from 195.226.194.242 port 50238 ssh2 Jan 10 03:44:20 host sshd[1419]: Received disconnect from 195.226.194.242 port 50238:11: Bye Bye [preauth] Jan 10 03:44:20 host sshd[1419]: Disconnected from 195.226.194.242 port 50238 [preauth] Jan 10 03:44:39 host sshd[1510]: User root from 128.199.133.168 not allowed because not listed in AllowUsers Jan 10 03:44:39 host sshd[1510]: input_userauth_request: invalid user root [preauth] Jan 10 03:44:39 host unix_chkpwd[1513]: password check failed for user (root) Jan 10 03:44:39 host sshd[1510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.168 user=root Jan 10 03:44:39 host sshd[1510]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:44:41 host sshd[1510]: Failed password for invalid user root from 128.199.133.168 port 36776 ssh2 Jan 10 03:44:41 host sshd[1510]: Received disconnect from 128.199.133.168 port 36776:11: Bye Bye [preauth] Jan 10 03:44:41 host sshd[1510]: Disconnected from 128.199.133.168 port 36776 [preauth] Jan 10 03:49:28 host sshd[2647]: User root from 128.199.133.168 not allowed because not listed in AllowUsers Jan 10 03:49:28 host sshd[2647]: input_userauth_request: invalid user root [preauth] Jan 10 03:49:28 host unix_chkpwd[2650]: password check failed for user (root) Jan 10 03:49:28 host sshd[2647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.168 user=root Jan 10 03:49:28 host sshd[2647]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 03:49:30 host sshd[2647]: Failed password for invalid user root from 128.199.133.168 port 38236 ssh2 Jan 10 03:49:30 host sshd[2647]: Received disconnect from 128.199.133.168 port 38236:11: Bye Bye [preauth] Jan 10 03:49:30 host sshd[2647]: Disconnected from 128.199.133.168 port 38236 [preauth] Jan 10 04:13:44 host sshd[6516]: Invalid user linaro from 195.226.194.242 port 31420 Jan 10 04:13:44 host sshd[6516]: input_userauth_request: invalid user linaro [preauth] Jan 10 04:13:44 host sshd[6516]: pam_unix(sshd:auth): check pass; user unknown Jan 10 04:13:44 host sshd[6516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 10 04:13:47 host sshd[6516]: Failed password for invalid user linaro from 195.226.194.242 port 31420 ssh2 Jan 10 04:13:47 host sshd[6516]: Received disconnect from 195.226.194.242 port 31420:11: Bye Bye [preauth] Jan 10 04:13:47 host sshd[6516]: Disconnected from 195.226.194.242 port 31420 [preauth] Jan 10 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=remysagr user-9=wwwkmaorg user-10=mrsclean user-11=wwwnexidigital user-12=gifterman user-13=palco123 user-14=kottayamcalldriv user-15=phmetals user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=wwwkaretakers user-24=cochintaxi user-25=wwwrmswll user-26=keralaholi user-27=wwwresourcehunte user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 04:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9tU0mUONswG58Qjs.~ Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9tU0mUONswG58Qjs.~' Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9tU0mUONswG58Qjs.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 04:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 04:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 04:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 04:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 04:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 04:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 04:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 04:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 04:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 04:22:06 host sshd[7880]: User root from 51.91.78.31 not allowed because not listed in AllowUsers Jan 10 04:22:06 host sshd[7880]: input_userauth_request: invalid user root [preauth] Jan 10 04:22:06 host unix_chkpwd[7883]: password check failed for user (root) Jan 10 04:22:06 host sshd[7880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.78.31 user=root Jan 10 04:22:06 host sshd[7880]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 04:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 04:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 04:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 04:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 04:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 04:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 04:22:08 host sshd[7880]: Failed password for invalid user root from 51.91.78.31 port 59726 ssh2 Jan 10 04:22:08 host sshd[7880]: Received disconnect from 51.91.78.31 port 59726:11: Bye Bye [preauth] Jan 10 04:22:08 host sshd[7880]: Disconnected from 51.91.78.31 port 59726 [preauth] Jan 10 04:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 04:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 04:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 04:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 04:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 04:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 04:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 04:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 04:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 04:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 04:27:14 host sshd[8579]: Invalid user deployer from 173.212.225.62 port 60358 Jan 10 04:27:14 host sshd[8579]: input_userauth_request: invalid user deployer [preauth] Jan 10 04:27:14 host sshd[8579]: pam_unix(sshd:auth): check pass; user unknown Jan 10 04:27:14 host sshd[8579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 04:27:15 host sshd[8579]: Failed password for invalid user deployer from 173.212.225.62 port 60358 ssh2 Jan 10 04:27:16 host sshd[8579]: Received disconnect from 173.212.225.62 port 60358:11: Bye Bye [preauth] Jan 10 04:27:16 host sshd[8579]: Disconnected from 173.212.225.62 port 60358 [preauth] Jan 10 04:27:22 host sshd[8605]: User root from 51.91.78.31 not allowed because not listed in AllowUsers Jan 10 04:27:22 host sshd[8605]: input_userauth_request: invalid user root [preauth] Jan 10 04:27:23 host unix_chkpwd[8613]: password check failed for user (root) Jan 10 04:27:23 host sshd[8605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.78.31 user=root Jan 10 04:27:23 host sshd[8605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 04:27:25 host sshd[8605]: Failed password for invalid user root from 51.91.78.31 port 58942 ssh2 Jan 10 04:27:25 host sshd[8605]: Received disconnect from 51.91.78.31 port 58942:11: Bye Bye [preauth] Jan 10 04:27:25 host sshd[8605]: Disconnected from 51.91.78.31 port 58942 [preauth] Jan 10 04:44:37 host sshd[11233]: Invalid user deployer from 195.226.194.242 port 54668 Jan 10 04:44:37 host sshd[11233]: input_userauth_request: invalid user deployer [preauth] Jan 10 04:44:37 host sshd[11233]: pam_unix(sshd:auth): check pass; user unknown Jan 10 04:44:37 host sshd[11233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 10 04:44:39 host sshd[11233]: Failed password for invalid user deployer from 195.226.194.242 port 54668 ssh2 Jan 10 04:44:39 host sshd[11233]: Received disconnect from 195.226.194.242 port 54668:11: Bye Bye [preauth] Jan 10 04:44:39 host sshd[11233]: Disconnected from 195.226.194.242 port 54668 [preauth] Jan 10 04:46:17 host sshd[11400]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 10 04:46:17 host sshd[11400]: input_userauth_request: invalid user root [preauth] Jan 10 04:46:17 host unix_chkpwd[11404]: password check failed for user (root) Jan 10 04:46:17 host sshd[11400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 10 04:46:17 host sshd[11400]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 04:46:20 host sshd[11400]: Failed password for invalid user root from 194.169.175.102 port 56929 ssh2 Jan 10 04:46:20 host sshd[11400]: Received disconnect from 194.169.175.102 port 56929:11: Client disconnecting normally [preauth] Jan 10 04:46:20 host sshd[11400]: Disconnected from 194.169.175.102 port 56929 [preauth] Jan 10 04:58:59 host sshd[13214]: Invalid user bx from 194.110.203.109 port 42846 Jan 10 04:58:59 host sshd[13214]: input_userauth_request: invalid user bx [preauth] Jan 10 04:58:59 host sshd[13214]: pam_unix(sshd:auth): check pass; user unknown Jan 10 04:58:59 host sshd[13214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 04:59:01 host sshd[13214]: Failed password for invalid user bx from 194.110.203.109 port 42846 ssh2 Jan 10 04:59:04 host sshd[13214]: pam_unix(sshd:auth): check pass; user unknown Jan 10 04:59:05 host sshd[13214]: Failed password for invalid user bx from 194.110.203.109 port 42846 ssh2 Jan 10 04:59:08 host sshd[13214]: pam_unix(sshd:auth): check pass; user unknown Jan 10 04:59:11 host sshd[13214]: Failed password for invalid user bx from 194.110.203.109 port 42846 ssh2 Jan 10 04:59:14 host sshd[13214]: Connection closed by 194.110.203.109 port 42846 [preauth] Jan 10 04:59:14 host sshd[13214]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 05:00:29 host sshd[13580]: Bad protocol version identification '\026\003\001\001 \001' from 164.52.25.253 port 41622 Jan 10 05:00:30 host sshd[13581]: Bad protocol version identification '\026\003\001' from 164.52.25.253 port 33415 Jan 10 05:00:30 host sshd[13583]: Bad protocol version identification '\026\003\001' from 164.52.25.253 port 38987 Jan 10 05:00:30 host sshd[13584]: Bad protocol version identification '\026\003\001' from 164.52.25.253 port 49937 Jan 10 05:00:34 host sshd[13585]: Connection reset by 164.52.25.253 port 44726 [preauth] Jan 10 05:17:46 host sshd[16330]: Connection closed by 162.142.125.221 port 52804 [preauth] Jan 10 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=disposeat user-4=wwwkmaorg user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=wwwletsstalkfood user-11=straightcurve user-12=bonifacegroup user-13=wwwevmhonda user-14=mrsclean user-15=wwwnexidigital user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 05:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 05:21:57 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 10 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 10 05:22:00 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-phbByOcZK5SPd33N.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-phbByOcZK5SPd33N.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-oMM2Jng8zSWmpZFC.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-oMM2Jng8zSWmpZFC.wp-toolkit-identifier Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 05:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LnsjG2Wq7Vj82lxi.~ Jan 10 05:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LnsjG2Wq7Vj82lxi.~' Jan 10 05:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LnsjG2Wq7Vj82lxi.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 05:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 05:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 05:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 05:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 05:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 05:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 05:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 05:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 05:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 05:22:13 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 05:22:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 05:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 05:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 05:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 05:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 05:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 05:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 05:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 05:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 05:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 05:22:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 05:22:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 05:22:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 05:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 05:22:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 05:22:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 05:22:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 05:22:28 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 05:22:31 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 05:40:39 host sshd[20568]: Invalid user deployer from 173.212.225.62 port 49374 Jan 10 05:40:39 host sshd[20568]: input_userauth_request: invalid user deployer [preauth] Jan 10 05:40:39 host sshd[20568]: pam_unix(sshd:auth): check pass; user unknown Jan 10 05:40:39 host sshd[20568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 05:40:41 host sshd[20568]: Failed password for invalid user deployer from 173.212.225.62 port 49374 ssh2 Jan 10 05:40:41 host sshd[20568]: Received disconnect from 173.212.225.62 port 49374:11: Bye Bye [preauth] Jan 10 05:40:41 host sshd[20568]: Disconnected from 173.212.225.62 port 49374 [preauth] Jan 10 05:45:36 host sshd[21188]: Invalid user tester from 195.226.194.242 port 20502 Jan 10 05:45:36 host sshd[21188]: input_userauth_request: invalid user tester [preauth] Jan 10 05:45:36 host sshd[21188]: pam_unix(sshd:auth): check pass; user unknown Jan 10 05:45:36 host sshd[21188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 10 05:45:38 host sshd[21188]: Failed password for invalid user tester from 195.226.194.242 port 20502 ssh2 Jan 10 05:45:38 host sshd[21188]: Received disconnect from 195.226.194.242 port 20502:11: Bye Bye [preauth] Jan 10 05:45:38 host sshd[21188]: Disconnected from 195.226.194.242 port 20502 [preauth] Jan 10 05:45:56 host sshd[21210]: Invalid user admin from 185.122.204.242 port 53686 Jan 10 05:45:56 host sshd[21210]: input_userauth_request: invalid user admin [preauth] Jan 10 05:45:56 host sshd[21210]: pam_unix(sshd:auth): check pass; user unknown Jan 10 05:45:56 host sshd[21210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 10 05:45:58 host sshd[21216]: Invalid user admin from 185.122.204.242 port 56840 Jan 10 05:45:58 host sshd[21216]: input_userauth_request: invalid user admin [preauth] Jan 10 05:45:58 host sshd[21216]: pam_unix(sshd:auth): check pass; user unknown Jan 10 05:45:58 host sshd[21216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 10 05:45:58 host sshd[21210]: Failed password for invalid user admin from 185.122.204.242 port 53686 ssh2 Jan 10 05:45:58 host sshd[21210]: Connection closed by 185.122.204.242 port 53686 [preauth] Jan 10 05:46:00 host sshd[21216]: Failed password for invalid user admin from 185.122.204.242 port 56840 ssh2 Jan 10 05:46:00 host sshd[21216]: Connection closed by 185.122.204.242 port 56840 [preauth] Jan 10 05:46:01 host sshd[21225]: Invalid user admin from 185.122.204.242 port 59984 Jan 10 05:46:01 host sshd[21225]: input_userauth_request: invalid user admin [preauth] Jan 10 05:46:01 host sshd[21225]: pam_unix(sshd:auth): check pass; user unknown Jan 10 05:46:01 host sshd[21225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 10 05:46:03 host sshd[21225]: Failed password for invalid user admin from 185.122.204.242 port 59984 ssh2 Jan 10 05:46:03 host sshd[21225]: Connection closed by 185.122.204.242 port 59984 [preauth] Jan 10 05:46:05 host sshd[21306]: Invalid user admin from 185.122.204.242 port 34860 Jan 10 05:46:05 host sshd[21306]: input_userauth_request: invalid user admin [preauth] Jan 10 05:46:05 host sshd[21306]: pam_unix(sshd:auth): check pass; user unknown Jan 10 05:46:05 host sshd[21306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 10 05:46:07 host sshd[21306]: Failed password for invalid user admin from 185.122.204.242 port 34860 ssh2 Jan 10 05:50:57 host sshd[21998]: User root from 43.153.68.27 not allowed because not listed in AllowUsers Jan 10 05:50:57 host sshd[21998]: input_userauth_request: invalid user root [preauth] Jan 10 05:50:57 host unix_chkpwd[22005]: password check failed for user (root) Jan 10 05:50:57 host sshd[21998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.68.27 user=root Jan 10 05:50:57 host sshd[21998]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 05:50:59 host sshd[21998]: Failed password for invalid user root from 43.153.68.27 port 34846 ssh2 Jan 10 05:50:59 host sshd[21998]: Received disconnect from 43.153.68.27 port 34846:11: Bye Bye [preauth] Jan 10 05:50:59 host sshd[21998]: Disconnected from 43.153.68.27 port 34846 [preauth] Jan 10 05:55:09 host sshd[22659]: User root from 43.153.68.27 not allowed because not listed in AllowUsers Jan 10 05:55:09 host sshd[22659]: input_userauth_request: invalid user root [preauth] Jan 10 05:55:09 host unix_chkpwd[22670]: password check failed for user (root) Jan 10 05:55:09 host sshd[22659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.68.27 user=root Jan 10 05:55:09 host sshd[22659]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 05:55:11 host sshd[22659]: Failed password for invalid user root from 43.153.68.27 port 36132 ssh2 Jan 10 06:13:43 host sshd[25424]: Did not receive identification string from 167.71.166.243 port 46108 Jan 10 06:13:52 host sshd[25441]: Connection closed by 172.104.11.34 port 11198 [preauth] Jan 10 06:13:54 host sshd[25445]: Connection closed by 172.104.11.34 port 11212 [preauth] Jan 10 06:13:55 host sshd[25448]: Connection closed by 172.104.11.34 port 11214 [preauth] Jan 10 06:17:25 host sshd[26204]: Connection closed by 167.71.166.243 port 33608 [preauth] Jan 10 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 06:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=disposeat user-4=remysagr user-5=wwwkmaorg user-6=pmcresources user-7=vfmassets user-8=wwwtestugo user-9=shalinijames user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=mrsclean user-15=wwwnexidigital user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 06:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ABnB0mWlpo288F5L.~ Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ABnB0mWlpo288F5L.~' Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ABnB0mWlpo288F5L.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 06:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 06:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 06:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 06:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 06:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 06:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 06:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 06:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 06:22:13 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 06:22:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 06:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 06:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 06:22:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 06:22:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 06:22:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 06:22:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 06:22:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 06:22:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 06:22:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 06:22:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 06:22:30 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 06:22:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 06:22:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 06:22:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 06:22:33 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 06:22:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 06:22:34 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 06:22:36 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 06:31:40 host sshd[28367]: Invalid user aaron from 107.189.30.59 port 54180 Jan 10 06:31:40 host sshd[28367]: input_userauth_request: invalid user aaron [preauth] Jan 10 06:31:40 host sshd[28367]: pam_unix(sshd:auth): check pass; user unknown Jan 10 06:31:40 host sshd[28367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 10 06:31:42 host sshd[28367]: Failed password for invalid user aaron from 107.189.30.59 port 54180 ssh2 Jan 10 06:31:43 host sshd[28367]: Connection closed by 107.189.30.59 port 54180 [preauth] Jan 10 06:35:32 host sshd[28983]: User root from 157.230.121.169 not allowed because not listed in AllowUsers Jan 10 06:35:32 host sshd[28983]: input_userauth_request: invalid user root [preauth] Jan 10 06:35:32 host unix_chkpwd[28988]: password check failed for user (root) Jan 10 06:35:32 host sshd[28983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.121.169 user=root Jan 10 06:35:32 host sshd[28983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:35:34 host sshd[28983]: Failed password for invalid user root from 157.230.121.169 port 36796 ssh2 Jan 10 06:35:34 host sshd[28983]: Received disconnect from 157.230.121.169 port 36796:11: Bye Bye [preauth] Jan 10 06:35:34 host sshd[28983]: Disconnected from 157.230.121.169 port 36796 [preauth] Jan 10 06:36:54 host sshd[29121]: User root from 209.141.57.23 not allowed because not listed in AllowUsers Jan 10 06:36:54 host sshd[29121]: input_userauth_request: invalid user root [preauth] Jan 10 06:36:54 host unix_chkpwd[29126]: password check failed for user (root) Jan 10 06:36:54 host sshd[29121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.57.23 user=root Jan 10 06:36:54 host sshd[29121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:36:56 host sshd[29121]: Failed password for invalid user root from 209.141.57.23 port 53510 ssh2 Jan 10 06:36:56 host sshd[29121]: Received disconnect from 209.141.57.23 port 53510:11: Bye Bye [preauth] Jan 10 06:36:56 host sshd[29121]: Disconnected from 209.141.57.23 port 53510 [preauth] Jan 10 06:38:22 host sshd[29268]: User root from 123.140.114.196 not allowed because not listed in AllowUsers Jan 10 06:38:22 host sshd[29268]: input_userauth_request: invalid user root [preauth] Jan 10 06:38:22 host unix_chkpwd[29279]: password check failed for user (root) Jan 10 06:38:22 host sshd[29268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.196 user=root Jan 10 06:38:22 host sshd[29268]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:38:22 host sshd[29275]: User root from 42.119.111.155 not allowed because not listed in AllowUsers Jan 10 06:38:22 host sshd[29275]: input_userauth_request: invalid user root [preauth] Jan 10 06:38:22 host unix_chkpwd[29280]: password check failed for user (root) Jan 10 06:38:22 host sshd[29275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.119.111.155 user=root Jan 10 06:38:22 host sshd[29275]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:38:24 host sshd[29268]: Failed password for invalid user root from 123.140.114.196 port 60486 ssh2 Jan 10 06:38:24 host sshd[29275]: Failed password for invalid user root from 42.119.111.155 port 38920 ssh2 Jan 10 06:38:24 host sshd[29268]: Received disconnect from 123.140.114.196 port 60486:11: Bye Bye [preauth] Jan 10 06:38:24 host sshd[29268]: Disconnected from 123.140.114.196 port 60486 [preauth] Jan 10 06:38:24 host sshd[29275]: Received disconnect from 42.119.111.155 port 38920:11: Bye Bye [preauth] Jan 10 06:38:24 host sshd[29275]: Disconnected from 42.119.111.155 port 38920 [preauth] Jan 10 06:39:47 host sshd[29439]: User root from 43.157.7.187 not allowed because not listed in AllowUsers Jan 10 06:39:47 host sshd[29439]: input_userauth_request: invalid user root [preauth] Jan 10 06:39:47 host unix_chkpwd[29442]: password check failed for user (root) Jan 10 06:39:47 host sshd[29439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.7.187 user=root Jan 10 06:39:47 host sshd[29439]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:39:50 host sshd[29439]: Failed password for invalid user root from 43.157.7.187 port 52596 ssh2 Jan 10 06:39:50 host sshd[29439]: Received disconnect from 43.157.7.187 port 52596:11: Bye Bye [preauth] Jan 10 06:39:50 host sshd[29439]: Disconnected from 43.157.7.187 port 52596 [preauth] Jan 10 06:40:02 host sshd[29489]: User root from 116.202.105.252 not allowed because not listed in AllowUsers Jan 10 06:40:02 host sshd[29489]: input_userauth_request: invalid user root [preauth] Jan 10 06:40:02 host unix_chkpwd[29492]: password check failed for user (root) Jan 10 06:40:02 host sshd[29489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.202.105.252 user=root Jan 10 06:40:02 host sshd[29489]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:40:04 host sshd[29489]: Failed password for invalid user root from 116.202.105.252 port 59948 ssh2 Jan 10 06:40:04 host sshd[29489]: Received disconnect from 116.202.105.252 port 59948:11: Bye Bye [preauth] Jan 10 06:40:04 host sshd[29489]: Disconnected from 116.202.105.252 port 59948 [preauth] Jan 10 06:40:17 host sshd[29518]: User root from 179.60.150.118 not allowed because not listed in AllowUsers Jan 10 06:40:17 host sshd[29518]: input_userauth_request: invalid user root [preauth] Jan 10 06:40:17 host unix_chkpwd[29523]: password check failed for user (root) Jan 10 06:40:17 host sshd[29518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.60.150.118 user=root Jan 10 06:40:17 host sshd[29518]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:40:19 host sshd[29518]: Failed password for invalid user root from 179.60.150.118 port 41382 ssh2 Jan 10 06:40:19 host sshd[29518]: Received disconnect from 179.60.150.118 port 41382:11: Bye Bye [preauth] Jan 10 06:40:19 host sshd[29518]: Disconnected from 179.60.150.118 port 41382 [preauth] Jan 10 06:41:06 host sshd[29745]: User root from 157.230.121.169 not allowed because not listed in AllowUsers Jan 10 06:41:06 host sshd[29745]: input_userauth_request: invalid user root [preauth] Jan 10 06:41:06 host unix_chkpwd[29748]: password check failed for user (root) Jan 10 06:41:06 host sshd[29745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.121.169 user=root Jan 10 06:41:06 host sshd[29745]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:41:07 host sshd[29745]: Failed password for invalid user root from 157.230.121.169 port 41424 ssh2 Jan 10 06:41:29 host sshd[29838]: User root from 209.141.57.23 not allowed because not listed in AllowUsers Jan 10 06:41:29 host sshd[29838]: input_userauth_request: invalid user root [preauth] Jan 10 06:41:29 host unix_chkpwd[29841]: password check failed for user (root) Jan 10 06:41:29 host sshd[29838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.57.23 user=root Jan 10 06:41:29 host sshd[29838]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:41:31 host sshd[29843]: User root from 42.119.111.155 not allowed because not listed in AllowUsers Jan 10 06:41:31 host sshd[29843]: input_userauth_request: invalid user root [preauth] Jan 10 06:41:31 host unix_chkpwd[29846]: password check failed for user (root) Jan 10 06:41:31 host sshd[29843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.119.111.155 user=root Jan 10 06:41:31 host sshd[29843]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:41:31 host sshd[29838]: Failed password for invalid user root from 209.141.57.23 port 47624 ssh2 Jan 10 06:41:33 host sshd[29843]: Failed password for invalid user root from 42.119.111.155 port 44178 ssh2 Jan 10 06:41:56 host sshd[29945]: User root from 179.60.150.118 not allowed because not listed in AllowUsers Jan 10 06:41:56 host sshd[29945]: input_userauth_request: invalid user root [preauth] Jan 10 06:41:56 host unix_chkpwd[29948]: password check failed for user (root) Jan 10 06:41:56 host sshd[29945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.60.150.118 user=root Jan 10 06:41:56 host sshd[29945]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:41:57 host sshd[29949]: User root from 116.202.105.252 not allowed because not listed in AllowUsers Jan 10 06:41:57 host sshd[29949]: input_userauth_request: invalid user root [preauth] Jan 10 06:41:57 host unix_chkpwd[29958]: password check failed for user (root) Jan 10 06:41:57 host sshd[29949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.202.105.252 user=root Jan 10 06:41:57 host sshd[29949]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:41:58 host sshd[29945]: Failed password for invalid user root from 179.60.150.118 port 54764 ssh2 Jan 10 06:41:58 host sshd[29945]: Received disconnect from 179.60.150.118 port 54764:11: Bye Bye [preauth] Jan 10 06:41:58 host sshd[29945]: Disconnected from 179.60.150.118 port 54764 [preauth] Jan 10 06:41:59 host sshd[29949]: Failed password for invalid user root from 116.202.105.252 port 51104 ssh2 Jan 10 06:41:59 host sshd[29949]: Received disconnect from 116.202.105.252 port 51104:11: Bye Bye [preauth] Jan 10 06:41:59 host sshd[29949]: Disconnected from 116.202.105.252 port 51104 [preauth] Jan 10 06:43:27 host sshd[30209]: User root from 104.218.166.164 not allowed because not listed in AllowUsers Jan 10 06:43:27 host sshd[30209]: input_userauth_request: invalid user root [preauth] Jan 10 06:43:27 host unix_chkpwd[30233]: password check failed for user (root) Jan 10 06:43:27 host sshd[30209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.218.166.164 user=root Jan 10 06:43:27 host sshd[30209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:43:29 host sshd[30209]: Failed password for invalid user root from 104.218.166.164 port 35078 ssh2 Jan 10 06:43:29 host sshd[30209]: Received disconnect from 104.218.166.164 port 35078:11: Bye Bye [preauth] Jan 10 06:43:29 host sshd[30209]: Disconnected from 104.218.166.164 port 35078 [preauth] Jan 10 06:43:51 host sshd[30277]: User root from 123.140.114.196 not allowed because not listed in AllowUsers Jan 10 06:43:51 host sshd[30277]: input_userauth_request: invalid user root [preauth] Jan 10 06:43:51 host unix_chkpwd[30280]: password check failed for user (root) Jan 10 06:43:51 host sshd[30277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.196 user=root Jan 10 06:43:51 host sshd[30277]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:43:53 host sshd[30277]: Failed password for invalid user root from 123.140.114.196 port 58710 ssh2 Jan 10 06:45:22 host sshd[30487]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 10 06:45:22 host sshd[30487]: input_userauth_request: invalid user root [preauth] Jan 10 06:45:22 host unix_chkpwd[30514]: password check failed for user (root) Jan 10 06:45:22 host sshd[30487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 10 06:45:22 host sshd[30487]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:45:24 host sshd[30487]: Failed password for invalid user root from 195.226.194.242 port 21820 ssh2 Jan 10 06:45:24 host sshd[30487]: Received disconnect from 195.226.194.242 port 21820:11: Bye Bye [preauth] Jan 10 06:45:24 host sshd[30487]: Disconnected from 195.226.194.242 port 21820 [preauth] Jan 10 06:45:59 host sshd[30696]: User root from 104.218.166.164 not allowed because not listed in AllowUsers Jan 10 06:45:59 host sshd[30696]: input_userauth_request: invalid user root [preauth] Jan 10 06:45:59 host unix_chkpwd[30699]: password check failed for user (root) Jan 10 06:45:59 host sshd[30696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.218.166.164 user=root Jan 10 06:45:59 host sshd[30696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:46:02 host sshd[30696]: Failed password for invalid user root from 104.218.166.164 port 36558 ssh2 Jan 10 06:46:02 host sshd[30696]: Received disconnect from 104.218.166.164 port 36558:11: Bye Bye [preauth] Jan 10 06:46:02 host sshd[30696]: Disconnected from 104.218.166.164 port 36558 [preauth] Jan 10 06:46:20 host sshd[30761]: User root from 43.157.7.187 not allowed because not listed in AllowUsers Jan 10 06:46:20 host sshd[30761]: input_userauth_request: invalid user root [preauth] Jan 10 06:46:20 host unix_chkpwd[30765]: password check failed for user (root) Jan 10 06:46:20 host sshd[30761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.7.187 user=root Jan 10 06:46:20 host sshd[30761]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 06:46:21 host sshd[30761]: Failed password for invalid user root from 43.157.7.187 port 47064 ssh2 Jan 10 06:46:22 host sshd[30761]: Received disconnect from 43.157.7.187 port 47064:11: Bye Bye [preauth] Jan 10 06:46:22 host sshd[30761]: Disconnected from 43.157.7.187 port 47064 [preauth] Jan 10 06:54:13 host sshd[31852]: Invalid user deployer from 173.212.225.62 port 38340 Jan 10 06:54:13 host sshd[31852]: input_userauth_request: invalid user deployer [preauth] Jan 10 06:54:14 host sshd[31852]: pam_unix(sshd:auth): check pass; user unknown Jan 10 06:54:14 host sshd[31852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 06:54:15 host sshd[31852]: Failed password for invalid user deployer from 173.212.225.62 port 38340 ssh2 Jan 10 06:54:15 host sshd[31852]: Received disconnect from 173.212.225.62 port 38340:11: Bye Bye [preauth] Jan 10 06:54:15 host sshd[31852]: Disconnected from 173.212.225.62 port 38340 [preauth] Jan 10 07:00:41 host sshd[415]: Invalid user by from 194.110.203.109 port 38736 Jan 10 07:00:41 host sshd[415]: input_userauth_request: invalid user by [preauth] Jan 10 07:00:41 host sshd[415]: pam_unix(sshd:auth): check pass; user unknown Jan 10 07:00:41 host sshd[415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 07:00:43 host sshd[415]: Failed password for invalid user by from 194.110.203.109 port 38736 ssh2 Jan 10 07:00:46 host sshd[415]: pam_unix(sshd:auth): check pass; user unknown Jan 10 07:00:48 host sshd[415]: Failed password for invalid user by from 194.110.203.109 port 38736 ssh2 Jan 10 07:00:51 host sshd[415]: pam_unix(sshd:auth): check pass; user unknown Jan 10 07:00:53 host sshd[415]: Failed password for invalid user by from 194.110.203.109 port 38736 ssh2 Jan 10 07:00:56 host sshd[415]: Connection closed by 194.110.203.109 port 38736 [preauth] Jan 10 07:00:56 host sshd[415]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 07:03:27 host sshd[856]: Did not receive identification string from 172.104.234.47 port 42910 Jan 10 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 07:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=wwwnexidigital user-21=mrsclean user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 07:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qWziB1PsFOWVymmf.~ Jan 10 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qWziB1PsFOWVymmf.~' Jan 10 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qWziB1PsFOWVymmf.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 07:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 07:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 07:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 07:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 07:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 07:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 07:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 07:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 07:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 07:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 07:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 07:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 07:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 07:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 07:22:18 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 07:22:23 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 07:22:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 07:22:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 07:22:24 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 07:22:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 07:22:24 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 07:22:25 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 07:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 07:22:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 07:22:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 07:22:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 07:22:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 07:22:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 07:22:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 07:22:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 07:22:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 07:22:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 07:22:31 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 07:22:32 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 07:40:01 host sshd[6911]: Did not receive identification string from 64.227.181.236 port 61000 Jan 10 07:42:02 host sshd[7150]: Connection closed by 109.162.134.89 port 39949 [preauth] Jan 10 08:08:06 host sshd[11166]: Invalid user deployer from 173.212.225.62 port 55518 Jan 10 08:08:06 host sshd[11166]: input_userauth_request: invalid user deployer [preauth] Jan 10 08:08:06 host sshd[11166]: pam_unix(sshd:auth): check pass; user unknown Jan 10 08:08:06 host sshd[11166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 08:08:08 host sshd[11166]: Failed password for invalid user deployer from 173.212.225.62 port 55518 ssh2 Jan 10 08:08:09 host sshd[11166]: Received disconnect from 173.212.225.62 port 55518:11: Bye Bye [preauth] Jan 10 08:08:09 host sshd[11166]: Disconnected from 173.212.225.62 port 55518 [preauth] Jan 10 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 08:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=wwwtestugo user-20=shalinijames user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=mrsclean user-26=wwwnexidigital user-27=gifterman user-28=palco123 user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 08:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-04CuDtaAoEDDSaX1.~ Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-04CuDtaAoEDDSaX1.~' Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-04CuDtaAoEDDSaX1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 08:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 08:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 08:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 08:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 08:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 08:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 08:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 08:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 08:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 08:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 08:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 08:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 08:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 08:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 08:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 08:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 08:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 08:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 08:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 08:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 08:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 08:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 08:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 08:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 08:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 08:54:46 host sshd[18341]: User root from 51.75.17.210 not allowed because not listed in AllowUsers Jan 10 08:54:46 host sshd[18341]: input_userauth_request: invalid user root [preauth] Jan 10 08:54:46 host unix_chkpwd[18345]: password check failed for user (root) Jan 10 08:54:46 host sshd[18341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.210 user=root Jan 10 08:54:46 host sshd[18341]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:54:48 host sshd[18341]: Failed password for invalid user root from 51.75.17.210 port 40158 ssh2 Jan 10 08:54:48 host sshd[18341]: Received disconnect from 51.75.17.210 port 40158:11: Bye Bye [preauth] Jan 10 08:54:48 host sshd[18341]: Disconnected from 51.75.17.210 port 40158 [preauth] Jan 10 08:55:50 host sshd[18584]: User root from 45.240.88.126 not allowed because not listed in AllowUsers Jan 10 08:55:50 host sshd[18584]: input_userauth_request: invalid user root [preauth] Jan 10 08:55:50 host unix_chkpwd[18587]: password check failed for user (root) Jan 10 08:55:50 host sshd[18584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.126 user=root Jan 10 08:55:50 host sshd[18584]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:55:51 host sshd[18584]: Failed password for invalid user root from 45.240.88.126 port 55350 ssh2 Jan 10 08:55:52 host sshd[18584]: Received disconnect from 45.240.88.126 port 55350:11: Bye Bye [preauth] Jan 10 08:55:52 host sshd[18584]: Disconnected from 45.240.88.126 port 55350 [preauth] Jan 10 08:56:11 host sshd[18630]: User root from 96.67.59.65 not allowed because not listed in AllowUsers Jan 10 08:56:11 host sshd[18630]: input_userauth_request: invalid user root [preauth] Jan 10 08:56:11 host unix_chkpwd[18634]: password check failed for user (root) Jan 10 08:56:11 host sshd[18630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.67.59.65 user=root Jan 10 08:56:11 host sshd[18630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:56:13 host sshd[18630]: Failed password for invalid user root from 96.67.59.65 port 47664 ssh2 Jan 10 08:56:13 host sshd[18630]: Received disconnect from 96.67.59.65 port 47664:11: Bye Bye [preauth] Jan 10 08:56:13 host sshd[18630]: Disconnected from 96.67.59.65 port 47664 [preauth] Jan 10 08:56:20 host sshd[18642]: User root from 161.35.186.178 not allowed because not listed in AllowUsers Jan 10 08:56:20 host sshd[18642]: input_userauth_request: invalid user root [preauth] Jan 10 08:56:20 host unix_chkpwd[18646]: password check failed for user (root) Jan 10 08:56:20 host sshd[18642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.186.178 user=root Jan 10 08:56:20 host sshd[18642]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:56:21 host sshd[18642]: Failed password for invalid user root from 161.35.186.178 port 42816 ssh2 Jan 10 08:56:22 host sshd[18642]: Received disconnect from 161.35.186.178 port 42816:11: Bye Bye [preauth] Jan 10 08:56:22 host sshd[18642]: Disconnected from 161.35.186.178 port 42816 [preauth] Jan 10 08:56:30 host sshd[18666]: User root from 167.172.190.215 not allowed because not listed in AllowUsers Jan 10 08:56:30 host sshd[18666]: input_userauth_request: invalid user root [preauth] Jan 10 08:56:30 host unix_chkpwd[18699]: password check failed for user (root) Jan 10 08:56:30 host sshd[18666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.190.215 user=root Jan 10 08:56:30 host sshd[18666]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:56:32 host sshd[18666]: Failed password for invalid user root from 167.172.190.215 port 49562 ssh2 Jan 10 08:56:32 host sshd[18666]: Received disconnect from 167.172.190.215 port 49562:11: Bye Bye [preauth] Jan 10 08:56:32 host sshd[18666]: Disconnected from 167.172.190.215 port 49562 [preauth] Jan 10 08:56:43 host sshd[18718]: User root from 103.164.221.210 not allowed because not listed in AllowUsers Jan 10 08:56:43 host sshd[18718]: input_userauth_request: invalid user root [preauth] Jan 10 08:56:43 host unix_chkpwd[18720]: password check failed for user (root) Jan 10 08:56:43 host sshd[18718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.164.221.210 user=root Jan 10 08:56:43 host sshd[18718]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:56:45 host sshd[18718]: Failed password for invalid user root from 103.164.221.210 port 42930 ssh2 Jan 10 08:56:45 host sshd[18718]: Received disconnect from 103.164.221.210 port 42930:11: Bye Bye [preauth] Jan 10 08:56:45 host sshd[18718]: Disconnected from 103.164.221.210 port 42930 [preauth] Jan 10 08:57:05 host sshd[18760]: User root from 23.94.216.203 not allowed because not listed in AllowUsers Jan 10 08:57:05 host sshd[18760]: input_userauth_request: invalid user root [preauth] Jan 10 08:57:05 host unix_chkpwd[18763]: password check failed for user (root) Jan 10 08:57:05 host sshd[18760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.216.203 user=root Jan 10 08:57:05 host sshd[18760]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:57:07 host sshd[18760]: Failed password for invalid user root from 23.94.216.203 port 57828 ssh2 Jan 10 08:57:07 host sshd[18760]: Received disconnect from 23.94.216.203 port 57828:11: Bye Bye [preauth] Jan 10 08:57:07 host sshd[18760]: Disconnected from 23.94.216.203 port 57828 [preauth] Jan 10 08:57:14 host sshd[18773]: User root from 138.2.121.219 not allowed because not listed in AllowUsers Jan 10 08:57:14 host sshd[18773]: input_userauth_request: invalid user root [preauth] Jan 10 08:57:14 host unix_chkpwd[18775]: password check failed for user (root) Jan 10 08:57:14 host sshd[18773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.121.219 user=root Jan 10 08:57:14 host sshd[18773]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:57:15 host sshd[18773]: Failed password for invalid user root from 138.2.121.219 port 48670 ssh2 Jan 10 08:57:16 host sshd[18773]: Received disconnect from 138.2.121.219 port 48670:11: Bye Bye [preauth] Jan 10 08:57:16 host sshd[18773]: Disconnected from 138.2.121.219 port 48670 [preauth] Jan 10 08:57:44 host sshd[18838]: User root from 118.101.192.62 not allowed because not listed in AllowUsers Jan 10 08:57:44 host sshd[18838]: input_userauth_request: invalid user root [preauth] Jan 10 08:57:45 host unix_chkpwd[18842]: password check failed for user (root) Jan 10 08:57:45 host sshd[18838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.192.62 user=root Jan 10 08:57:45 host sshd[18838]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:57:47 host sshd[18838]: Failed password for invalid user root from 118.101.192.62 port 52138 ssh2 Jan 10 08:57:47 host sshd[18838]: Received disconnect from 118.101.192.62 port 52138:11: Bye Bye [preauth] Jan 10 08:57:47 host sshd[18838]: Disconnected from 118.101.192.62 port 52138 [preauth] Jan 10 08:58:27 host sshd[18968]: User root from 164.92.154.145 not allowed because not listed in AllowUsers Jan 10 08:58:27 host sshd[18968]: input_userauth_request: invalid user root [preauth] Jan 10 08:58:27 host unix_chkpwd[18981]: password check failed for user (root) Jan 10 08:58:27 host sshd[18968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.154.145 user=root Jan 10 08:58:27 host sshd[18968]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:58:29 host sshd[18968]: Failed password for invalid user root from 164.92.154.145 port 36416 ssh2 Jan 10 08:58:29 host sshd[18968]: Received disconnect from 164.92.154.145 port 36416:11: Bye Bye [preauth] Jan 10 08:58:29 host sshd[18968]: Disconnected from 164.92.154.145 port 36416 [preauth] Jan 10 08:58:51 host sshd[19053]: User root from 203.199.243.12 not allowed because not listed in AllowUsers Jan 10 08:58:51 host sshd[19053]: input_userauth_request: invalid user root [preauth] Jan 10 08:58:51 host unix_chkpwd[19055]: password check failed for user (root) Jan 10 08:58:51 host sshd[19053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.199.243.12 user=root Jan 10 08:58:51 host sshd[19053]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:58:53 host sshd[19053]: Failed password for invalid user root from 203.199.243.12 port 33434 ssh2 Jan 10 08:58:53 host sshd[19053]: Received disconnect from 203.199.243.12 port 33434:11: Bye Bye [preauth] Jan 10 08:58:53 host sshd[19053]: Disconnected from 203.199.243.12 port 33434 [preauth] Jan 10 08:59:27 host sshd[19125]: User root from 51.75.17.210 not allowed because not listed in AllowUsers Jan 10 08:59:27 host sshd[19125]: input_userauth_request: invalid user root [preauth] Jan 10 08:59:27 host unix_chkpwd[19132]: password check failed for user (root) Jan 10 08:59:27 host sshd[19125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.210 user=root Jan 10 08:59:27 host sshd[19125]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 08:59:30 host sshd[19125]: Failed password for invalid user root from 51.75.17.210 port 35086 ssh2 Jan 10 08:59:30 host sshd[19125]: Received disconnect from 51.75.17.210 port 35086:11: Bye Bye [preauth] Jan 10 08:59:30 host sshd[19125]: Disconnected from 51.75.17.210 port 35086 [preauth] Jan 10 09:00:06 host sshd[19258]: User root from 164.92.154.145 not allowed because not listed in AllowUsers Jan 10 09:00:06 host sshd[19258]: input_userauth_request: invalid user root [preauth] Jan 10 09:00:06 host unix_chkpwd[19264]: password check failed for user (root) Jan 10 09:00:06 host sshd[19258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.154.145 user=root Jan 10 09:00:06 host sshd[19258]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:00:08 host sshd[19258]: Failed password for invalid user root from 164.92.154.145 port 38616 ssh2 Jan 10 09:00:09 host sshd[19298]: User root from 103.164.221.210 not allowed because not listed in AllowUsers Jan 10 09:00:09 host sshd[19298]: input_userauth_request: invalid user root [preauth] Jan 10 09:00:09 host unix_chkpwd[19301]: password check failed for user (root) Jan 10 09:00:09 host sshd[19298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.164.221.210 user=root Jan 10 09:00:09 host sshd[19298]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:00:10 host sshd[19298]: Failed password for invalid user root from 103.164.221.210 port 55286 ssh2 Jan 10 09:00:10 host sshd[19298]: Received disconnect from 103.164.221.210 port 55286:11: Bye Bye [preauth] Jan 10 09:00:10 host sshd[19298]: Disconnected from 103.164.221.210 port 55286 [preauth] Jan 10 09:00:15 host sshd[19338]: User root from 167.172.190.215 not allowed because not listed in AllowUsers Jan 10 09:00:15 host sshd[19338]: input_userauth_request: invalid user root [preauth] Jan 10 09:00:15 host unix_chkpwd[19342]: password check failed for user (root) Jan 10 09:00:15 host sshd[19338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.190.215 user=root Jan 10 09:00:15 host sshd[19338]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:00:17 host sshd[19338]: Failed password for invalid user root from 167.172.190.215 port 51684 ssh2 Jan 10 09:00:17 host sshd[19338]: Received disconnect from 167.172.190.215 port 51684:11: Bye Bye [preauth] Jan 10 09:00:17 host sshd[19338]: Disconnected from 167.172.190.215 port 51684 [preauth] Jan 10 09:00:21 host sshd[19377]: User root from 45.240.88.126 not allowed because not listed in AllowUsers Jan 10 09:00:21 host sshd[19377]: input_userauth_request: invalid user root [preauth] Jan 10 09:00:21 host unix_chkpwd[19381]: password check failed for user (root) Jan 10 09:00:21 host sshd[19377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.126 user=root Jan 10 09:00:21 host sshd[19377]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:00:24 host sshd[19377]: Failed password for invalid user root from 45.240.88.126 port 43526 ssh2 Jan 10 09:00:31 host sshd[19466]: User root from 23.94.216.203 not allowed because not listed in AllowUsers Jan 10 09:00:31 host sshd[19466]: input_userauth_request: invalid user root [preauth] Jan 10 09:00:31 host unix_chkpwd[19470]: password check failed for user (root) Jan 10 09:00:31 host sshd[19466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.216.203 user=root Jan 10 09:00:31 host sshd[19466]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:00:32 host sshd[19466]: Failed password for invalid user root from 23.94.216.203 port 41084 ssh2 Jan 10 09:00:32 host sshd[19475]: User root from 161.35.186.178 not allowed because not listed in AllowUsers Jan 10 09:00:32 host sshd[19475]: input_userauth_request: invalid user root [preauth] Jan 10 09:00:32 host unix_chkpwd[19507]: password check failed for user (root) Jan 10 09:00:32 host sshd[19475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.186.178 user=root Jan 10 09:00:32 host sshd[19475]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:00:34 host sshd[19475]: Failed password for invalid user root from 161.35.186.178 port 52756 ssh2 Jan 10 09:00:34 host sshd[19475]: Received disconnect from 161.35.186.178 port 52756:11: Bye Bye [preauth] Jan 10 09:00:34 host sshd[19475]: Disconnected from 161.35.186.178 port 52756 [preauth] Jan 10 09:00:42 host sshd[19656]: User root from 95.85.15.86 not allowed because not listed in AllowUsers Jan 10 09:00:42 host sshd[19656]: input_userauth_request: invalid user root [preauth] Jan 10 09:00:42 host unix_chkpwd[19663]: password check failed for user (root) Jan 10 09:00:42 host sshd[19656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.15.86 user=root Jan 10 09:00:42 host sshd[19656]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:00:44 host sshd[19656]: Failed password for invalid user root from 95.85.15.86 port 34248 ssh2 Jan 10 09:00:45 host sshd[19656]: Received disconnect from 95.85.15.86 port 34248:11: Bye Bye [preauth] Jan 10 09:00:45 host sshd[19656]: Disconnected from 95.85.15.86 port 34248 [preauth] Jan 10 09:00:46 host sshd[19672]: User root from 96.67.59.65 not allowed because not listed in AllowUsers Jan 10 09:00:46 host sshd[19672]: input_userauth_request: invalid user root [preauth] Jan 10 09:00:46 host unix_chkpwd[19677]: password check failed for user (root) Jan 10 09:00:46 host sshd[19672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.67.59.65 user=root Jan 10 09:00:46 host sshd[19672]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:00:48 host sshd[19672]: Failed password for invalid user root from 96.67.59.65 port 43035 ssh2 Jan 10 09:00:52 host sshd[19714]: User root from 118.101.192.62 not allowed because not listed in AllowUsers Jan 10 09:00:52 host sshd[19714]: input_userauth_request: invalid user root [preauth] Jan 10 09:00:52 host unix_chkpwd[19719]: password check failed for user (root) Jan 10 09:00:52 host sshd[19714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.192.62 user=root Jan 10 09:00:52 host sshd[19714]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:00:54 host sshd[19714]: Failed password for invalid user root from 118.101.192.62 port 59062 ssh2 Jan 10 09:00:54 host sshd[19714]: Received disconnect from 118.101.192.62 port 59062:11: Bye Bye [preauth] Jan 10 09:00:54 host sshd[19714]: Disconnected from 118.101.192.62 port 59062 [preauth] Jan 10 09:01:28 host sshd[19838]: User root from 203.199.243.12 not allowed because not listed in AllowUsers Jan 10 09:01:28 host sshd[19838]: input_userauth_request: invalid user root [preauth] Jan 10 09:01:28 host unix_chkpwd[19840]: password check failed for user (root) Jan 10 09:01:28 host sshd[19838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.199.243.12 user=root Jan 10 09:01:28 host sshd[19838]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:01:29 host sshd[19838]: Failed password for invalid user root from 203.199.243.12 port 37436 ssh2 Jan 10 09:01:29 host sshd[19838]: Received disconnect from 203.199.243.12 port 37436:11: Bye Bye [preauth] Jan 10 09:01:29 host sshd[19838]: Disconnected from 203.199.243.12 port 37436 [preauth] Jan 10 09:02:25 host sshd[19987]: User root from 138.2.121.219 not allowed because not listed in AllowUsers Jan 10 09:02:25 host sshd[19987]: input_userauth_request: invalid user root [preauth] Jan 10 09:02:25 host unix_chkpwd[19990]: password check failed for user (root) Jan 10 09:02:25 host sshd[19987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.121.219 user=root Jan 10 09:02:25 host sshd[19987]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:02:25 host sshd[19983]: User root from 95.85.15.86 not allowed because not listed in AllowUsers Jan 10 09:02:25 host sshd[19983]: input_userauth_request: invalid user root [preauth] Jan 10 09:02:25 host unix_chkpwd[19991]: password check failed for user (root) Jan 10 09:02:25 host sshd[19983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.15.86 user=root Jan 10 09:02:25 host sshd[19983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 09:02:27 host sshd[19987]: Failed password for invalid user root from 138.2.121.219 port 45282 ssh2 Jan 10 09:02:27 host sshd[19987]: Received disconnect from 138.2.121.219 port 45282:11: Bye Bye [preauth] Jan 10 09:02:27 host sshd[19987]: Disconnected from 138.2.121.219 port 45282 [preauth] Jan 10 09:02:27 host sshd[19983]: Failed password for invalid user root from 95.85.15.86 port 59470 ssh2 Jan 10 09:02:27 host sshd[19983]: Received disconnect from 95.85.15.86 port 59470:11: Bye Bye [preauth] Jan 10 09:02:27 host sshd[19983]: Disconnected from 95.85.15.86 port 59470 [preauth] Jan 10 09:04:37 host sshd[20335]: Invalid user bz from 194.110.203.109 port 52416 Jan 10 09:04:37 host sshd[20335]: input_userauth_request: invalid user bz [preauth] Jan 10 09:04:37 host sshd[20335]: pam_unix(sshd:auth): check pass; user unknown Jan 10 09:04:37 host sshd[20335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 09:04:39 host sshd[20335]: Failed password for invalid user bz from 194.110.203.109 port 52416 ssh2 Jan 10 09:04:42 host sshd[20335]: pam_unix(sshd:auth): check pass; user unknown Jan 10 09:04:44 host sshd[20335]: Failed password for invalid user bz from 194.110.203.109 port 52416 ssh2 Jan 10 09:04:47 host sshd[20335]: pam_unix(sshd:auth): check pass; user unknown Jan 10 09:04:49 host sshd[20335]: Failed password for invalid user bz from 194.110.203.109 port 52416 ssh2 Jan 10 09:04:53 host sshd[20335]: Connection closed by 194.110.203.109 port 52416 [preauth] Jan 10 09:04:53 host sshd[20335]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 09:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=disposeat user-6=remysagr user-7=wwwkmaorg user-8=woodpeck user-9=wwwkapin user-10=gifterman user-11=palco123 user-12=kottayamcalldriv user-13=phmetals user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 09:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MEpzTWYjETDf3Pe5.~ Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MEpzTWYjETDf3Pe5.~' Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MEpzTWYjETDf3Pe5.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 09:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 09:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 09:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 09:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 09:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 09:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 09:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 09:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 09:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 09:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 09:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 09:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 09:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 09:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 09:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 09:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 09:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 09:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 09:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 09:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 09:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 09:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 09:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 09:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 09:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 09:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 09:22:22 host sshd[23738]: Invalid user deployer from 173.212.225.62 port 44320 Jan 10 09:22:22 host sshd[23738]: input_userauth_request: invalid user deployer [preauth] Jan 10 09:22:22 host sshd[23738]: pam_unix(sshd:auth): check pass; user unknown Jan 10 09:22:22 host sshd[23738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 09:22:24 host sshd[23738]: Failed password for invalid user deployer from 173.212.225.62 port 44320 ssh2 Jan 10 09:22:24 host sshd[23738]: Received disconnect from 173.212.225.62 port 44320:11: Bye Bye [preauth] Jan 10 09:22:24 host sshd[23738]: Disconnected from 173.212.225.62 port 44320 [preauth] Jan 10 09:25:30 host sshd[24303]: Connection closed by 167.94.145.57 port 49146 [preauth] Jan 10 10:00:18 host sshd[29949]: User root from 110.235.243.121 not allowed because not listed in AllowUsers Jan 10 10:00:18 host sshd[29949]: input_userauth_request: invalid user root [preauth] Jan 10 10:00:18 host unix_chkpwd[29953]: password check failed for user (root) Jan 10 10:00:18 host sshd[29949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.235.243.121 user=root Jan 10 10:00:18 host sshd[29949]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 10:00:20 host sshd[29949]: Failed password for invalid user root from 110.235.243.121 port 54490 ssh2 Jan 10 10:00:20 host sshd[29949]: Received disconnect from 110.235.243.121 port 54490:11: Bye Bye [preauth] Jan 10 10:00:20 host sshd[29949]: Disconnected from 110.235.243.121 port 54490 [preauth] Jan 10 10:05:41 host sshd[30814]: User root from 110.235.243.121 not allowed because not listed in AllowUsers Jan 10 10:05:41 host sshd[30814]: input_userauth_request: invalid user root [preauth] Jan 10 10:05:41 host unix_chkpwd[30818]: password check failed for user (root) Jan 10 10:05:41 host sshd[30814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.235.243.121 user=root Jan 10 10:05:41 host sshd[30814]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 10:05:44 host sshd[30814]: Failed password for invalid user root from 110.235.243.121 port 44806 ssh2 Jan 10 10:05:44 host sshd[30814]: Received disconnect from 110.235.243.121 port 44806:11: Bye Bye [preauth] Jan 10 10:05:44 host sshd[30814]: Disconnected from 110.235.243.121 port 44806 [preauth] Jan 10 10:10:56 host sshd[31681]: Did not receive identification string from 202.51.74.123 port 59950 Jan 10 10:15:14 host sshd[32385]: Did not receive identification string from 154.89.5.74 port 59380 Jan 10 10:15:28 host sshd[32387]: Connection closed by 154.89.5.74 port 59438 [preauth] Jan 10 10:21:25 host sshd[1097]: Bad protocol version identification '\003' from 45.227.254.36 port 3639 Jan 10 10:21:54 host sshd[1262]: User root from 128.199.105.162 not allowed because not listed in AllowUsers Jan 10 10:21:54 host sshd[1262]: input_userauth_request: invalid user root [preauth] Jan 10 10:21:54 host unix_chkpwd[1265]: password check failed for user (root) Jan 10 10:21:54 host sshd[1262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.105.162 user=root Jan 10 10:21:54 host sshd[1262]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 10:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:57 host sshd[1262]: Failed password for invalid user root from 128.199.105.162 port 50212 ssh2 Jan 10 10:21:57 host sshd[1262]: Received disconnect from 128.199.105.162 port 50212:11: Bye Bye [preauth] Jan 10 10:21:57 host sshd[1262]: Disconnected from 128.199.105.162 port 50212 [preauth] Jan 10 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=kottayamcalldriv user-2=phmetals user-3=palco123 user-4=gifterman user-5=wwwnexidigital user-6=mrsclean user-7=wwwevmhonda user-8=bonifacegroup user-9=wwwletsstalkfood user-10=straightcurve user-11=shalinijames user-12=wwwtestugo user-13=vfmassets user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 10:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fLkYv9rilSASIGFi.~ Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fLkYv9rilSASIGFi.~' Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fLkYv9rilSASIGFi.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 10:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 10:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 10:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 10:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 10:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 10:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 10:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 10:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 10:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 10:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 10:22:12 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 10:22:14 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 10:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 10:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 10:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 10:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 10:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 10:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 10:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 10:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 10:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 10:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 10:22:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 10:22:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 10:22:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 10:22:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 10:22:30 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 10:22:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 10:22:31 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 10:22:31 host sshd[1637]: Did not receive identification string from 115.219.25.240 port 45978 Jan 10 10:22:32 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 10:26:53 host sshd[2323]: User root from 128.199.105.162 not allowed because not listed in AllowUsers Jan 10 10:26:53 host sshd[2323]: input_userauth_request: invalid user root [preauth] Jan 10 10:26:53 host unix_chkpwd[2325]: password check failed for user (root) Jan 10 10:26:53 host sshd[2323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.105.162 user=root Jan 10 10:26:53 host sshd[2323]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 10:26:55 host sshd[2323]: Failed password for invalid user root from 128.199.105.162 port 57154 ssh2 Jan 10 10:26:56 host sshd[2323]: Received disconnect from 128.199.105.162 port 57154:11: Bye Bye [preauth] Jan 10 10:26:56 host sshd[2323]: Disconnected from 128.199.105.162 port 57154 [preauth] Jan 10 10:36:20 host sshd[3857]: Invalid user deployer from 173.212.225.62 port 33304 Jan 10 10:36:20 host sshd[3857]: input_userauth_request: invalid user deployer [preauth] Jan 10 10:36:21 host sshd[3857]: pam_unix(sshd:auth): check pass; user unknown Jan 10 10:36:21 host sshd[3857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 10:36:22 host sshd[3857]: Failed password for invalid user deployer from 173.212.225.62 port 33304 ssh2 Jan 10 10:36:22 host sshd[3857]: Received disconnect from 173.212.225.62 port 33304:11: Bye Bye [preauth] Jan 10 10:36:22 host sshd[3857]: Disconnected from 173.212.225.62 port 33304 [preauth] Jan 10 10:38:52 host sshd[4184]: Did not receive identification string from 138.68.14.68 port 35126 Jan 10 10:41:42 host sshd[4667]: Invalid user admin from 138.68.14.68 port 60458 Jan 10 10:41:42 host sshd[4667]: input_userauth_request: invalid user admin [preauth] Jan 10 10:41:43 host sshd[4667]: pam_unix(sshd:auth): check pass; user unknown Jan 10 10:41:43 host sshd[4667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.14.68 Jan 10 10:41:44 host sshd[4667]: Failed password for invalid user admin from 138.68.14.68 port 60458 ssh2 Jan 10 10:41:44 host sshd[4667]: Connection closed by 138.68.14.68 port 60458 [preauth] Jan 10 10:43:57 host sshd[4927]: User centos from 138.68.14.68 not allowed because not listed in AllowUsers Jan 10 10:43:57 host sshd[4927]: input_userauth_request: invalid user centos [preauth] Jan 10 10:43:57 host unix_chkpwd[4931]: password check failed for user (centos) Jan 10 10:43:57 host sshd[4927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.14.68 user=centos Jan 10 10:43:59 host sshd[4927]: Failed password for invalid user centos from 138.68.14.68 port 44212 ssh2 Jan 10 10:44:00 host sshd[4927]: Connection closed by 138.68.14.68 port 44212 [preauth] Jan 10 11:03:35 host sshd[8101]: Did not receive identification string from 167.71.166.243 port 60424 Jan 10 11:08:14 host sshd[8739]: Invalid user c from 194.110.203.109 port 37282 Jan 10 11:08:14 host sshd[8739]: input_userauth_request: invalid user c [preauth] Jan 10 11:08:14 host sshd[8739]: pam_unix(sshd:auth): check pass; user unknown Jan 10 11:08:14 host sshd[8739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 11:08:15 host sshd[8739]: Failed password for invalid user c from 194.110.203.109 port 37282 ssh2 Jan 10 11:08:18 host sshd[8739]: pam_unix(sshd:auth): check pass; user unknown Jan 10 11:08:21 host sshd[8739]: Failed password for invalid user c from 194.110.203.109 port 37282 ssh2 Jan 10 11:08:24 host sshd[8739]: pam_unix(sshd:auth): check pass; user unknown Jan 10 11:08:26 host sshd[8739]: Failed password for invalid user c from 194.110.203.109 port 37282 ssh2 Jan 10 11:08:29 host sshd[8739]: Connection closed by 194.110.203.109 port 37282 [preauth] Jan 10 11:08:29 host sshd[8739]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 11:14:23 host sshd[9648]: Connection reset by 167.71.166.243 port 55698 [preauth] Jan 10 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 11:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=kottayamcalldriv user-8=phmetals user-9=gifterman user-10=palco123 user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=remysagr user-15=wwwkmaorg user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 11:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zEvDSys9kWBAa8n1.~ Jan 10 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zEvDSys9kWBAa8n1.~' Jan 10 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zEvDSys9kWBAa8n1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 11:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 11:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood WpToolkitNotification send_admin_vulnerability_found_notification 'message=WP Toolkit has detected new vulnerabilities on WordPress sites under your care. It is strongly recommended to update or disable vulnerable assets on these sites. You can also configure WP Toolkit to perform automatic actions when vulnerabilities are detected. <table border='"'"'1'"'"' cellpadding='"'"'5'"'"' cellspacing='"'"'0'"'"'>#012 <thead bgcolor='"'"'#f4f5f7'"'"'>#012 #012 <th>Site</th>#012 <th>Vulnerability</th>#012 </thead>#012 <tbody><br/><br/>The following vulnerabilities need your attention because they have to be addressed manually:<br/><br/><tr>#012 #012 <td>ugotechnologies.com/old</td>#012 <td>Wordpress Strong Testimonials plugin < 3.0.3 - Contributor+ Stored XSS vulnerability</td>#012</tr></tbody>#012</table> Jan 10 11:22:03 host sudo: wp-toolkit : (command continued) <br/><br/>Automatic actions can be defined on the site autoupdate policy screen.' --output=json Jan 10 11:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 11:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 11:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 11:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 11:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 11:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 11:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 11:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 11:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 11:22:08 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 11:22:10 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 11:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 11:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 11:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 11:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 11:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 11:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 11:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 11:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 11:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 11:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 11:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 11:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 11:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 11:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 11:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 11:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 11:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 11:22:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 11:50:13 host sshd[15301]: Invalid user devops from 173.212.225.62 port 50492 Jan 10 11:50:13 host sshd[15301]: input_userauth_request: invalid user devops [preauth] Jan 10 11:50:13 host sshd[15301]: pam_unix(sshd:auth): check pass; user unknown Jan 10 11:50:13 host sshd[15301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 11:50:15 host sshd[15301]: Failed password for invalid user devops from 173.212.225.62 port 50492 ssh2 Jan 10 11:50:15 host sshd[15301]: Received disconnect from 173.212.225.62 port 50492:11: Bye Bye [preauth] Jan 10 11:50:15 host sshd[15301]: Disconnected from 173.212.225.62 port 50492 [preauth] Jan 10 12:02:14 host sshd[17022]: Invalid user randy from 107.189.30.59 port 40640 Jan 10 12:02:14 host sshd[17022]: input_userauth_request: invalid user randy [preauth] Jan 10 12:02:14 host sshd[17022]: pam_unix(sshd:auth): check pass; user unknown Jan 10 12:02:14 host sshd[17022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 10 12:02:17 host sshd[17022]: Failed password for invalid user randy from 107.189.30.59 port 40640 ssh2 Jan 10 12:02:18 host sshd[17022]: Connection closed by 107.189.30.59 port 40640 [preauth] Jan 10 12:08:33 host sshd[18060]: User root from 43.156.97.185 not allowed because not listed in AllowUsers Jan 10 12:08:33 host sshd[18060]: input_userauth_request: invalid user root [preauth] Jan 10 12:08:33 host unix_chkpwd[18062]: password check failed for user (root) Jan 10 12:08:33 host sshd[18060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.97.185 user=root Jan 10 12:08:33 host sshd[18060]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 12:08:35 host sshd[18060]: Failed password for invalid user root from 43.156.97.185 port 56270 ssh2 Jan 10 12:08:35 host sshd[18060]: Received disconnect from 43.156.97.185 port 56270:11: Bye Bye [preauth] Jan 10 12:08:35 host sshd[18060]: Disconnected from 43.156.97.185 port 56270 [preauth] Jan 10 12:12:08 host sshd[19485]: User root from 43.156.97.185 not allowed because not listed in AllowUsers Jan 10 12:12:08 host sshd[19485]: input_userauth_request: invalid user root [preauth] Jan 10 12:12:09 host unix_chkpwd[19487]: password check failed for user (root) Jan 10 12:12:09 host sshd[19485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.97.185 user=root Jan 10 12:12:09 host sshd[19485]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 12:12:11 host sshd[19485]: Failed password for invalid user root from 43.156.97.185 port 39530 ssh2 Jan 10 12:12:57 host sshd[19654]: User root from 200.73.132.27 not allowed because not listed in AllowUsers Jan 10 12:12:57 host sshd[19654]: input_userauth_request: invalid user root [preauth] Jan 10 12:12:57 host unix_chkpwd[19663]: password check failed for user (root) Jan 10 12:12:57 host sshd[19654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.132.27 user=root Jan 10 12:12:57 host sshd[19654]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 12:12:59 host sshd[19654]: Failed password for invalid user root from 200.73.132.27 port 34354 ssh2 Jan 10 12:12:59 host sshd[19654]: Received disconnect from 200.73.132.27 port 34354:11: Bye Bye [preauth] Jan 10 12:12:59 host sshd[19654]: Disconnected from 200.73.132.27 port 34354 [preauth] Jan 10 12:15:54 host sshd[20354]: Connection closed by 45.79.172.21 port 24052 [preauth] Jan 10 12:15:57 host sshd[20359]: Connection closed by 45.79.172.21 port 24066 [preauth] Jan 10 12:15:58 host sshd[20363]: Did not receive identification string from 45.79.172.21 port 42366 Jan 10 12:18:24 host sshd[20640]: User root from 200.73.132.27 not allowed because not listed in AllowUsers Jan 10 12:18:24 host sshd[20640]: input_userauth_request: invalid user root [preauth] Jan 10 12:18:24 host unix_chkpwd[20650]: password check failed for user (root) Jan 10 12:18:24 host sshd[20640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.132.27 user=root Jan 10 12:18:24 host sshd[20640]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 12:18:26 host sshd[20640]: Failed password for invalid user root from 200.73.132.27 port 41504 ssh2 Jan 10 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 12:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=kottayamcalldriv user-24=phmetals user-25=palco123 user-26=gifterman user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 12:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RHNFONoxXiLpWKTH.~ Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RHNFONoxXiLpWKTH.~' Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RHNFONoxXiLpWKTH.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 12:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 12:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 12:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 12:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 12:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 12:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 12:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 12:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 12:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 12:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 12:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 12:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 12:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 12:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 12:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 12:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 12:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 12:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 12:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 12:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 12:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 12:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 12:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 12:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 12:24:04 host sshd[21704]: Connection closed by 167.248.133.118 port 46902 [preauth] Jan 10 12:29:52 host sshd[22584]: User root from 14.102.74.99 not allowed because not listed in AllowUsers Jan 10 12:29:52 host sshd[22584]: input_userauth_request: invalid user root [preauth] Jan 10 12:29:52 host unix_chkpwd[22587]: password check failed for user (root) Jan 10 12:29:52 host sshd[22584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.74.99 user=root Jan 10 12:29:52 host sshd[22584]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 12:29:54 host sshd[22584]: Failed password for invalid user root from 14.102.74.99 port 49374 ssh2 Jan 10 12:29:54 host sshd[22584]: Received disconnect from 14.102.74.99 port 49374:11: Bye Bye [preauth] Jan 10 12:29:54 host sshd[22584]: Disconnected from 14.102.74.99 port 49374 [preauth] Jan 10 12:34:56 host sshd[23371]: User root from 14.102.74.99 not allowed because not listed in AllowUsers Jan 10 12:34:56 host sshd[23371]: input_userauth_request: invalid user root [preauth] Jan 10 12:34:56 host unix_chkpwd[23373]: password check failed for user (root) Jan 10 12:34:56 host sshd[23371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.74.99 user=root Jan 10 12:34:56 host sshd[23371]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 12:34:59 host sshd[23371]: Failed password for invalid user root from 14.102.74.99 port 45310 ssh2 Jan 10 12:34:59 host sshd[23371]: Received disconnect from 14.102.74.99 port 45310:11: Bye Bye [preauth] Jan 10 12:34:59 host sshd[23371]: Disconnected from 14.102.74.99 port 45310 [preauth] Jan 10 12:38:42 host sshd[23977]: Did not receive identification string from 165.232.182.130 port 49340 Jan 10 13:04:19 host sshd[28231]: User root from 167.172.190.187 not allowed because not listed in AllowUsers Jan 10 13:04:19 host sshd[28231]: input_userauth_request: invalid user root [preauth] Jan 10 13:04:19 host unix_chkpwd[28235]: password check failed for user (root) Jan 10 13:04:19 host sshd[28231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.190.187 user=root Jan 10 13:04:19 host sshd[28231]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:04:21 host sshd[28231]: Failed password for invalid user root from 167.172.190.187 port 42338 ssh2 Jan 10 13:04:21 host sshd[28231]: Received disconnect from 167.172.190.187 port 42338:11: Bye Bye [preauth] Jan 10 13:04:21 host sshd[28231]: Disconnected from 167.172.190.187 port 42338 [preauth] Jan 10 13:04:23 host sshd[28241]: Invalid user devops from 173.212.225.62 port 39458 Jan 10 13:04:23 host sshd[28241]: input_userauth_request: invalid user devops [preauth] Jan 10 13:04:23 host sshd[28241]: pam_unix(sshd:auth): check pass; user unknown Jan 10 13:04:23 host sshd[28241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 13:04:25 host sshd[28241]: Failed password for invalid user devops from 173.212.225.62 port 39458 ssh2 Jan 10 13:04:25 host sshd[28241]: Received disconnect from 173.212.225.62 port 39458:11: Bye Bye [preauth] Jan 10 13:04:25 host sshd[28241]: Disconnected from 173.212.225.62 port 39458 [preauth] Jan 10 13:07:03 host sshd[28649]: User root from 146.190.52.81 not allowed because not listed in AllowUsers Jan 10 13:07:03 host sshd[28649]: input_userauth_request: invalid user root [preauth] Jan 10 13:07:03 host unix_chkpwd[28653]: password check failed for user (root) Jan 10 13:07:03 host sshd[28649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.52.81 user=root Jan 10 13:07:03 host sshd[28649]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:07:05 host sshd[28649]: Failed password for invalid user root from 146.190.52.81 port 59276 ssh2 Jan 10 13:07:05 host sshd[28649]: Received disconnect from 146.190.52.81 port 59276:11: Bye Bye [preauth] Jan 10 13:07:05 host sshd[28649]: Disconnected from 146.190.52.81 port 59276 [preauth] Jan 10 13:09:06 host sshd[29020]: User root from 146.190.52.81 not allowed because not listed in AllowUsers Jan 10 13:09:06 host sshd[29020]: input_userauth_request: invalid user root [preauth] Jan 10 13:09:06 host unix_chkpwd[29026]: password check failed for user (root) Jan 10 13:09:06 host sshd[29020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.52.81 user=root Jan 10 13:09:06 host sshd[29020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:09:09 host sshd[29020]: Failed password for invalid user root from 146.190.52.81 port 36708 ssh2 Jan 10 13:09:09 host sshd[29020]: Received disconnect from 146.190.52.81 port 36708:11: Bye Bye [preauth] Jan 10 13:09:09 host sshd[29020]: Disconnected from 146.190.52.81 port 36708 [preauth] Jan 10 13:13:31 host sshd[29726]: Invalid user ca from 194.110.203.109 port 56532 Jan 10 13:13:31 host sshd[29726]: input_userauth_request: invalid user ca [preauth] Jan 10 13:13:31 host sshd[29726]: pam_unix(sshd:auth): check pass; user unknown Jan 10 13:13:31 host sshd[29726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 13:13:34 host sshd[29726]: Failed password for invalid user ca from 194.110.203.109 port 56532 ssh2 Jan 10 13:13:37 host sshd[29726]: pam_unix(sshd:auth): check pass; user unknown Jan 10 13:13:39 host sshd[29726]: Failed password for invalid user ca from 194.110.203.109 port 56532 ssh2 Jan 10 13:13:42 host sshd[29726]: pam_unix(sshd:auth): check pass; user unknown Jan 10 13:13:44 host sshd[29726]: Failed password for invalid user ca from 194.110.203.109 port 56532 ssh2 Jan 10 13:13:48 host sshd[29726]: Connection closed by 194.110.203.109 port 56532 [preauth] Jan 10 13:13:48 host sshd[29726]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 13:17:24 host sshd[30375]: User root from 82.111.224.129 not allowed because not listed in AllowUsers Jan 10 13:17:24 host sshd[30375]: input_userauth_request: invalid user root [preauth] Jan 10 13:17:24 host unix_chkpwd[30379]: password check failed for user (root) Jan 10 13:17:24 host sshd[30375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.111.224.129 user=root Jan 10 13:17:24 host sshd[30375]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:17:26 host sshd[30375]: Failed password for invalid user root from 82.111.224.129 port 54416 ssh2 Jan 10 13:17:26 host sshd[30375]: Received disconnect from 82.111.224.129 port 54416:11: Bye Bye [preauth] Jan 10 13:17:26 host sshd[30375]: Disconnected from 82.111.224.129 port 54416 [preauth] Jan 10 13:17:50 host sshd[30463]: User root from 34.68.149.134 not allowed because not listed in AllowUsers Jan 10 13:17:50 host sshd[30463]: input_userauth_request: invalid user root [preauth] Jan 10 13:17:50 host unix_chkpwd[30467]: password check failed for user (root) Jan 10 13:17:50 host sshd[30463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.68.149.134 user=root Jan 10 13:17:50 host sshd[30463]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:17:53 host sshd[30463]: Failed password for invalid user root from 34.68.149.134 port 55670 ssh2 Jan 10 13:17:53 host sshd[30463]: Received disconnect from 34.68.149.134 port 55670:11: Bye Bye [preauth] Jan 10 13:17:53 host sshd[30463]: Disconnected from 34.68.149.134 port 55670 [preauth] Jan 10 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 13:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=keralaholi user-7=wwwresourcehunte user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=mrsclean user-22=wwwnexidigital user-23=palco123 user-24=gifterman user-25=kottayamcalldriv user-26=phmetals user-27=wwwletsstalkfood user-28=straightcurve user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 13:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DU2IRFNNND0LNEvM.~ Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DU2IRFNNND0LNEvM.~' Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DU2IRFNNND0LNEvM.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 13:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 13:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 13:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 13:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 13:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 13:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 13:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 13:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 13:22:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 13:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 13:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 13:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 13:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 13:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 13:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 13:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 13:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 13:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 13:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 13:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 13:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 13:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 13:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 13:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 13:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 13:22:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 13:22:24 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 13:23:21 host sshd[31620]: User root from 82.111.224.129 not allowed because not listed in AllowUsers Jan 10 13:23:21 host sshd[31620]: input_userauth_request: invalid user root [preauth] Jan 10 13:23:21 host unix_chkpwd[31622]: password check failed for user (root) Jan 10 13:23:21 host sshd[31620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.111.224.129 user=root Jan 10 13:23:21 host sshd[31620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:23:23 host sshd[31620]: Failed password for invalid user root from 82.111.224.129 port 55609 ssh2 Jan 10 13:23:50 host sshd[31710]: User root from 34.68.149.134 not allowed because not listed in AllowUsers Jan 10 13:23:50 host sshd[31710]: input_userauth_request: invalid user root [preauth] Jan 10 13:23:50 host unix_chkpwd[31713]: password check failed for user (root) Jan 10 13:23:50 host sshd[31710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.68.149.134 user=root Jan 10 13:23:50 host sshd[31710]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:23:52 host sshd[31710]: Failed password for invalid user root from 34.68.149.134 port 33720 ssh2 Jan 10 13:23:52 host sshd[31710]: Received disconnect from 34.68.149.134 port 33720:11: Bye Bye [preauth] Jan 10 13:23:52 host sshd[31710]: Disconnected from 34.68.149.134 port 33720 [preauth] Jan 10 13:28:48 host sshd[32390]: Did not receive identification string from 113.214.1.10 port 52432 Jan 10 13:28:55 host sshd[32395]: User root from 201.73.144.67 not allowed because not listed in AllowUsers Jan 10 13:28:55 host sshd[32395]: input_userauth_request: invalid user root [preauth] Jan 10 13:28:55 host unix_chkpwd[32399]: password check failed for user (root) Jan 10 13:28:55 host sshd[32395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.73.144.67 user=root Jan 10 13:28:55 host sshd[32395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:28:57 host sshd[32395]: Failed password for invalid user root from 201.73.144.67 port 55738 ssh2 Jan 10 13:28:57 host sshd[32395]: Received disconnect from 201.73.144.67 port 55738:11: Bye Bye [preauth] Jan 10 13:28:57 host sshd[32395]: Disconnected from 201.73.144.67 port 55738 [preauth] Jan 10 13:30:46 host sshd[302]: User root from 20.54.73.159 not allowed because not listed in AllowUsers Jan 10 13:30:46 host sshd[302]: input_userauth_request: invalid user root [preauth] Jan 10 13:30:46 host unix_chkpwd[306]: password check failed for user (root) Jan 10 13:30:46 host sshd[302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.54.73.159 user=root Jan 10 13:30:46 host sshd[302]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:30:48 host sshd[302]: Failed password for invalid user root from 20.54.73.159 port 46636 ssh2 Jan 10 13:30:48 host sshd[302]: Received disconnect from 20.54.73.159 port 46636:11: Bye Bye [preauth] Jan 10 13:30:48 host sshd[302]: Disconnected from 20.54.73.159 port 46636 [preauth] Jan 10 13:34:18 host sshd[803]: User root from 20.54.73.159 not allowed because not listed in AllowUsers Jan 10 13:34:18 host sshd[803]: input_userauth_request: invalid user root [preauth] Jan 10 13:34:18 host unix_chkpwd[806]: password check failed for user (root) Jan 10 13:34:18 host sshd[803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.54.73.159 user=root Jan 10 13:34:18 host sshd[803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:34:20 host sshd[803]: Failed password for invalid user root from 20.54.73.159 port 43046 ssh2 Jan 10 13:34:21 host sshd[803]: Received disconnect from 20.54.73.159 port 43046:11: Bye Bye [preauth] Jan 10 13:34:21 host sshd[803]: Disconnected from 20.54.73.159 port 43046 [preauth] Jan 10 13:35:13 host sshd[1076]: User root from 201.73.144.67 not allowed because not listed in AllowUsers Jan 10 13:35:13 host sshd[1076]: input_userauth_request: invalid user root [preauth] Jan 10 13:35:13 host unix_chkpwd[1083]: password check failed for user (root) Jan 10 13:35:13 host sshd[1076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.73.144.67 user=root Jan 10 13:35:13 host sshd[1076]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:35:14 host sshd[1076]: Failed password for invalid user root from 201.73.144.67 port 41814 ssh2 Jan 10 13:35:15 host sshd[1076]: Received disconnect from 201.73.144.67 port 41814:11: Bye Bye [preauth] Jan 10 13:35:15 host sshd[1076]: Disconnected from 201.73.144.67 port 41814 [preauth] Jan 10 13:51:16 host sshd[3693]: User root from 45.158.181.150 not allowed because not listed in AllowUsers Jan 10 13:51:16 host sshd[3693]: input_userauth_request: invalid user root [preauth] Jan 10 13:51:16 host unix_chkpwd[3696]: password check failed for user (root) Jan 10 13:51:16 host sshd[3693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.158.181.150 user=root Jan 10 13:51:16 host sshd[3693]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:51:18 host sshd[3693]: Failed password for invalid user root from 45.158.181.150 port 44486 ssh2 Jan 10 13:51:18 host sshd[3693]: Received disconnect from 45.158.181.150 port 44486:11: Bye Bye [preauth] Jan 10 13:51:18 host sshd[3693]: Disconnected from 45.158.181.150 port 44486 [preauth] Jan 10 13:52:41 host sshd[3904]: User root from 167.71.10.58 not allowed because not listed in AllowUsers Jan 10 13:52:41 host sshd[3904]: input_userauth_request: invalid user root [preauth] Jan 10 13:52:41 host unix_chkpwd[3947]: password check failed for user (root) Jan 10 13:52:41 host sshd[3904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.10.58 user=root Jan 10 13:52:41 host sshd[3904]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:52:44 host sshd[3904]: Failed password for invalid user root from 167.71.10.58 port 56492 ssh2 Jan 10 13:52:44 host sshd[3904]: Received disconnect from 167.71.10.58 port 56492:11: Bye Bye [preauth] Jan 10 13:52:44 host sshd[3904]: Disconnected from 167.71.10.58 port 56492 [preauth] Jan 10 13:54:34 host sshd[4189]: User root from 134.122.127.155 not allowed because not listed in AllowUsers Jan 10 13:54:34 host sshd[4189]: input_userauth_request: invalid user root [preauth] Jan 10 13:54:34 host unix_chkpwd[4192]: password check failed for user (root) Jan 10 13:54:34 host sshd[4189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.127.155 user=root Jan 10 13:54:34 host sshd[4189]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:54:35 host sshd[4189]: Failed password for invalid user root from 134.122.127.155 port 48862 ssh2 Jan 10 13:54:35 host sshd[4189]: Received disconnect from 134.122.127.155 port 48862:11: Bye Bye [preauth] Jan 10 13:54:35 host sshd[4189]: Disconnected from 134.122.127.155 port 48862 [preauth] Jan 10 13:55:25 host sshd[4286]: User root from 42.200.11.54 not allowed because not listed in AllowUsers Jan 10 13:55:25 host sshd[4286]: input_userauth_request: invalid user root [preauth] Jan 10 13:55:25 host unix_chkpwd[4300]: password check failed for user (root) Jan 10 13:55:25 host sshd[4286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.11.54 user=root Jan 10 13:55:25 host sshd[4286]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:55:28 host sshd[4286]: Failed password for invalid user root from 42.200.11.54 port 57052 ssh2 Jan 10 13:55:28 host sshd[4286]: Received disconnect from 42.200.11.54 port 57052:11: Bye Bye [preauth] Jan 10 13:55:28 host sshd[4286]: Disconnected from 42.200.11.54 port 57052 [preauth] Jan 10 13:56:01 host sshd[4367]: User root from 162.243.48.133 not allowed because not listed in AllowUsers Jan 10 13:56:01 host sshd[4367]: input_userauth_request: invalid user root [preauth] Jan 10 13:56:01 host unix_chkpwd[4373]: password check failed for user (root) Jan 10 13:56:01 host sshd[4367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.48.133 user=root Jan 10 13:56:01 host sshd[4367]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:56:03 host sshd[4367]: Failed password for invalid user root from 162.243.48.133 port 42156 ssh2 Jan 10 13:56:03 host sshd[4367]: Received disconnect from 162.243.48.133 port 42156:11: Bye Bye [preauth] Jan 10 13:56:03 host sshd[4367]: Disconnected from 162.243.48.133 port 42156 [preauth] Jan 10 13:56:04 host sshd[4383]: User root from 45.158.181.150 not allowed because not listed in AllowUsers Jan 10 13:56:04 host sshd[4383]: input_userauth_request: invalid user root [preauth] Jan 10 13:56:04 host unix_chkpwd[4386]: password check failed for user (root) Jan 10 13:56:04 host sshd[4383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.158.181.150 user=root Jan 10 13:56:04 host sshd[4383]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:56:06 host sshd[4383]: Failed password for invalid user root from 45.158.181.150 port 34776 ssh2 Jan 10 13:56:06 host sshd[4383]: Received disconnect from 45.158.181.150 port 34776:11: Bye Bye [preauth] Jan 10 13:56:06 host sshd[4383]: Disconnected from 45.158.181.150 port 34776 [preauth] Jan 10 13:58:24 host sshd[4717]: User root from 167.71.10.58 not allowed because not listed in AllowUsers Jan 10 13:58:24 host sshd[4717]: input_userauth_request: invalid user root [preauth] Jan 10 13:58:24 host unix_chkpwd[4721]: password check failed for user (root) Jan 10 13:58:24 host sshd[4717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.10.58 user=root Jan 10 13:58:24 host sshd[4717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:58:27 host sshd[4717]: Failed password for invalid user root from 167.71.10.58 port 43452 ssh2 Jan 10 13:58:27 host sshd[4717]: Received disconnect from 167.71.10.58 port 43452:11: Bye Bye [preauth] Jan 10 13:58:27 host sshd[4717]: Disconnected from 167.71.10.58 port 43452 [preauth] Jan 10 13:58:39 host sshd[4893]: User root from 134.122.127.155 not allowed because not listed in AllowUsers Jan 10 13:58:39 host sshd[4893]: input_userauth_request: invalid user root [preauth] Jan 10 13:58:39 host unix_chkpwd[4908]: password check failed for user (root) Jan 10 13:58:39 host sshd[4893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.127.155 user=root Jan 10 13:58:39 host sshd[4893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 13:58:41 host sshd[4893]: Failed password for invalid user root from 134.122.127.155 port 58436 ssh2 Jan 10 13:58:41 host sshd[4893]: Received disconnect from 134.122.127.155 port 58436:11: Bye Bye [preauth] Jan 10 13:58:41 host sshd[4893]: Disconnected from 134.122.127.155 port 58436 [preauth] Jan 10 14:00:15 host sshd[5148]: User root from 42.200.11.54 not allowed because not listed in AllowUsers Jan 10 14:00:15 host sshd[5148]: input_userauth_request: invalid user root [preauth] Jan 10 14:00:15 host unix_chkpwd[5151]: password check failed for user (root) Jan 10 14:00:15 host sshd[5148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.11.54 user=root Jan 10 14:00:15 host sshd[5148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 14:00:17 host sshd[5148]: Failed password for invalid user root from 42.200.11.54 port 42774 ssh2 Jan 10 14:00:17 host sshd[5148]: Received disconnect from 42.200.11.54 port 42774:11: Bye Bye [preauth] Jan 10 14:00:17 host sshd[5148]: Disconnected from 42.200.11.54 port 42774 [preauth] Jan 10 14:00:20 host sshd[5165]: User root from 162.243.48.133 not allowed because not listed in AllowUsers Jan 10 14:00:20 host sshd[5165]: input_userauth_request: invalid user root [preauth] Jan 10 14:00:20 host unix_chkpwd[5193]: password check failed for user (root) Jan 10 14:00:20 host sshd[5165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.48.133 user=root Jan 10 14:00:20 host sshd[5165]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 14:00:22 host sshd[5165]: Failed password for invalid user root from 162.243.48.133 port 51952 ssh2 Jan 10 14:00:22 host sshd[5165]: Received disconnect from 162.243.48.133 port 51952:11: Bye Bye [preauth] Jan 10 14:00:22 host sshd[5165]: Disconnected from 162.243.48.133 port 51952 [preauth] Jan 10 14:18:45 host sshd[7742]: Invalid user devops from 173.212.225.62 port 56708 Jan 10 14:18:45 host sshd[7742]: input_userauth_request: invalid user devops [preauth] Jan 10 14:18:45 host sshd[7742]: pam_unix(sshd:auth): check pass; user unknown Jan 10 14:18:45 host sshd[7742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 14:18:47 host sshd[7742]: Failed password for invalid user devops from 173.212.225.62 port 56708 ssh2 Jan 10 14:18:47 host sshd[7742]: Received disconnect from 173.212.225.62 port 56708:11: Bye Bye [preauth] Jan 10 14:18:47 host sshd[7742]: Disconnected from 173.212.225.62 port 56708 [preauth] Jan 10 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:21:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 14:21:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 14:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 14:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=disposeat user-6=remysagr user-7=wwwkmaorg user-8=woodpeck user-9=wwwkapin user-10=palco123 user-11=gifterman user-12=phmetals user-13=kottayamcalldriv user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 14:22:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aQKiV48ETvcmruy1.~ Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aQKiV48ETvcmruy1.~' Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aQKiV48ETvcmruy1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 14:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 14:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 14:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 14:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 14:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 14:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 14:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 14:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 14:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 14:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 14:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 14:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 14:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 14:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 14:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 14:22:11 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 14:22:13 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 14:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 14:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 14:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 14:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 14:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 14:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 14:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 14:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 14:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 14:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 14:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 14:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 14:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 14:22:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 14:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 14:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 14:22:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 14:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 15:04:47 host sshd[14080]: User root from 165.227.211.13 not allowed because not listed in AllowUsers Jan 10 15:04:47 host sshd[14080]: input_userauth_request: invalid user root [preauth] Jan 10 15:04:47 host unix_chkpwd[14085]: password check failed for user (root) Jan 10 15:04:47 host sshd[14080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.211.13 user=root Jan 10 15:04:47 host sshd[14080]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:04:48 host sshd[14080]: Failed password for invalid user root from 165.227.211.13 port 59422 ssh2 Jan 10 15:04:48 host sshd[14080]: Received disconnect from 165.227.211.13 port 59422:11: Bye Bye [preauth] Jan 10 15:04:48 host sshd[14080]: Disconnected from 165.227.211.13 port 59422 [preauth] Jan 10 15:05:14 host sshd[14137]: User root from 34.81.69.1 not allowed because not listed in AllowUsers Jan 10 15:05:14 host sshd[14137]: input_userauth_request: invalid user root [preauth] Jan 10 15:05:14 host unix_chkpwd[14139]: password check failed for user (root) Jan 10 15:05:14 host sshd[14137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.81.69.1 user=root Jan 10 15:05:14 host sshd[14137]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:05:16 host sshd[14137]: Failed password for invalid user root from 34.81.69.1 port 37624 ssh2 Jan 10 15:05:16 host sshd[14137]: Received disconnect from 34.81.69.1 port 37624:11: Bye Bye [preauth] Jan 10 15:05:16 host sshd[14137]: Disconnected from 34.81.69.1 port 37624 [preauth] Jan 10 15:06:32 host sshd[14287]: User root from 167.172.85.160 not allowed because not listed in AllowUsers Jan 10 15:06:32 host sshd[14287]: input_userauth_request: invalid user root [preauth] Jan 10 15:06:32 host unix_chkpwd[14289]: password check failed for user (root) Jan 10 15:06:32 host sshd[14287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.85.160 user=root Jan 10 15:06:32 host sshd[14287]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:06:34 host sshd[14287]: Failed password for invalid user root from 167.172.85.160 port 52614 ssh2 Jan 10 15:06:34 host sshd[14287]: Received disconnect from 167.172.85.160 port 52614:11: Bye Bye [preauth] Jan 10 15:06:34 host sshd[14287]: Disconnected from 167.172.85.160 port 52614 [preauth] Jan 10 15:07:26 host sshd[14473]: User root from 43.133.39.46 not allowed because not listed in AllowUsers Jan 10 15:07:26 host sshd[14473]: input_userauth_request: invalid user root [preauth] Jan 10 15:07:26 host unix_chkpwd[14476]: password check failed for user (root) Jan 10 15:07:26 host sshd[14473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.39.46 user=root Jan 10 15:07:26 host sshd[14473]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:07:28 host sshd[14473]: Failed password for invalid user root from 43.133.39.46 port 38158 ssh2 Jan 10 15:07:28 host sshd[14473]: Received disconnect from 43.133.39.46 port 38158:11: Bye Bye [preauth] Jan 10 15:07:28 host sshd[14473]: Disconnected from 43.133.39.46 port 38158 [preauth] Jan 10 15:08:59 host sshd[14650]: User root from 45.225.160.66 not allowed because not listed in AllowUsers Jan 10 15:08:59 host sshd[14650]: input_userauth_request: invalid user root [preauth] Jan 10 15:08:59 host unix_chkpwd[14653]: password check failed for user (root) Jan 10 15:08:59 host sshd[14650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.66 user=root Jan 10 15:08:59 host sshd[14650]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:09:02 host sshd[14650]: Failed password for invalid user root from 45.225.160.66 port 54776 ssh2 Jan 10 15:09:02 host sshd[14650]: Received disconnect from 45.225.160.66 port 54776:11: Bye Bye [preauth] Jan 10 15:09:02 host sshd[14650]: Disconnected from 45.225.160.66 port 54776 [preauth] Jan 10 15:10:10 host sshd[14814]: User root from 165.227.211.13 not allowed because not listed in AllowUsers Jan 10 15:10:10 host sshd[14814]: input_userauth_request: invalid user root [preauth] Jan 10 15:10:10 host unix_chkpwd[14817]: password check failed for user (root) Jan 10 15:10:10 host sshd[14814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.211.13 user=root Jan 10 15:10:10 host sshd[14814]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:10:11 host sshd[14814]: Failed password for invalid user root from 165.227.211.13 port 59356 ssh2 Jan 10 15:10:59 host sshd[14942]: User root from 43.133.39.46 not allowed because not listed in AllowUsers Jan 10 15:10:59 host sshd[14942]: input_userauth_request: invalid user root [preauth] Jan 10 15:10:59 host unix_chkpwd[14944]: password check failed for user (root) Jan 10 15:10:59 host sshd[14942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.39.46 user=root Jan 10 15:10:59 host sshd[14942]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:11:01 host sshd[14942]: Failed password for invalid user root from 43.133.39.46 port 52226 ssh2 Jan 10 15:11:01 host sshd[14942]: Received disconnect from 43.133.39.46 port 52226:11: Bye Bye [preauth] Jan 10 15:11:01 host sshd[14942]: Disconnected from 43.133.39.46 port 52226 [preauth] Jan 10 15:11:33 host sshd[15037]: User root from 34.81.69.1 not allowed because not listed in AllowUsers Jan 10 15:11:33 host sshd[15037]: input_userauth_request: invalid user root [preauth] Jan 10 15:11:33 host unix_chkpwd[15039]: password check failed for user (root) Jan 10 15:11:33 host sshd[15037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.81.69.1 user=root Jan 10 15:11:33 host sshd[15037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:11:35 host sshd[15037]: Failed password for invalid user root from 34.81.69.1 port 38252 ssh2 Jan 10 15:11:35 host sshd[15037]: Received disconnect from 34.81.69.1 port 38252:11: Bye Bye [preauth] Jan 10 15:11:35 host sshd[15037]: Disconnected from 34.81.69.1 port 38252 [preauth] Jan 10 15:12:05 host sshd[15220]: User root from 167.172.85.160 not allowed because not listed in AllowUsers Jan 10 15:12:05 host sshd[15220]: input_userauth_request: invalid user root [preauth] Jan 10 15:12:05 host unix_chkpwd[15223]: password check failed for user (root) Jan 10 15:12:05 host sshd[15220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.85.160 user=root Jan 10 15:12:05 host sshd[15220]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:12:07 host sshd[15220]: Failed password for invalid user root from 167.172.85.160 port 46134 ssh2 Jan 10 15:12:13 host sshd[15260]: User root from 45.225.160.66 not allowed because not listed in AllowUsers Jan 10 15:12:13 host sshd[15260]: input_userauth_request: invalid user root [preauth] Jan 10 15:12:13 host unix_chkpwd[15263]: password check failed for user (root) Jan 10 15:12:13 host sshd[15260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.66 user=root Jan 10 15:12:13 host sshd[15260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:12:15 host sshd[15260]: Failed password for invalid user root from 45.225.160.66 port 35386 ssh2 Jan 10 15:12:16 host sshd[15260]: Received disconnect from 45.225.160.66 port 35386:11: Bye Bye [preauth] Jan 10 15:12:16 host sshd[15260]: Disconnected from 45.225.160.66 port 35386 [preauth] Jan 10 15:16:58 host sshd[15886]: Bad protocol version identification '\026\003\001\001\t\001' from 152.32.157.157 port 59876 Jan 10 15:17:17 host sshd[15888]: Did not receive identification string from 152.32.157.157 port 60382 Jan 10 15:17:20 host sshd[15921]: Connection closed by 152.32.157.157 port 46694 [preauth] Jan 10 15:17:21 host sshd[15924]: Protocol major versions differ for 152.32.157.157 port 48792: SSH-2.0-OpenSSH_7.4 vs. SSH-1.5-Server Jan 10 15:19:41 host sshd[16287]: Invalid user cb from 194.110.203.109 port 54760 Jan 10 15:19:41 host sshd[16287]: input_userauth_request: invalid user cb [preauth] Jan 10 15:19:41 host sshd[16287]: pam_unix(sshd:auth): check pass; user unknown Jan 10 15:19:41 host sshd[16287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 15:19:42 host sshd[16287]: Failed password for invalid user cb from 194.110.203.109 port 54760 ssh2 Jan 10 15:19:46 host sshd[16287]: pam_unix(sshd:auth): check pass; user unknown Jan 10 15:19:47 host sshd[16287]: Failed password for invalid user cb from 194.110.203.109 port 54760 ssh2 Jan 10 15:19:51 host sshd[16287]: pam_unix(sshd:auth): check pass; user unknown Jan 10 15:19:52 host sshd[16287]: Failed password for invalid user cb from 194.110.203.109 port 54760 ssh2 Jan 10 15:19:56 host sshd[16287]: Connection closed by 194.110.203.109 port 54760 [preauth] Jan 10 15:19:56 host sshd[16287]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 15:21:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=ugotscom user-12=wwwkmaorg user-13=disposeat user-14=remysagr user-15=wwwkapin user-16=woodpeck user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=straightcurve user-24=wwwletsstalkfood user-25=palco123 user-26=gifterman user-27=phmetals user-28=kottayamcalldriv user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 15:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1jp9SI9oXYZYRyaR.~ Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1jp9SI9oXYZYRyaR.~' Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1jp9SI9oXYZYRyaR.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 15:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 15:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 15:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 15:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 15:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 15:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 15:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 15:22:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 15:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 15:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 15:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 15:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 15:22:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 15:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 15:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 15:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 15:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 15:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 15:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 15:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 15:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 15:22:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 15:22:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 15:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 15:22:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 15:22:23 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 15:33:28 host sshd[18840]: Invalid user devops from 173.212.225.62 port 45730 Jan 10 15:33:28 host sshd[18840]: input_userauth_request: invalid user devops [preauth] Jan 10 15:33:28 host sshd[18840]: pam_unix(sshd:auth): check pass; user unknown Jan 10 15:33:28 host sshd[18840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 15:33:30 host sshd[18840]: Failed password for invalid user devops from 173.212.225.62 port 45730 ssh2 Jan 10 15:33:30 host sshd[18840]: Received disconnect from 173.212.225.62 port 45730:11: Bye Bye [preauth] Jan 10 15:33:30 host sshd[18840]: Disconnected from 173.212.225.62 port 45730 [preauth] Jan 10 15:52:21 host sshd[21788]: User root from 49.88.112.114 not allowed because not listed in AllowUsers Jan 10 15:52:21 host sshd[21788]: input_userauth_request: invalid user root [preauth] Jan 10 15:52:21 host unix_chkpwd[21795]: password check failed for user (root) Jan 10 15:52:21 host sshd[21788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114 user=root Jan 10 15:52:21 host sshd[21788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:52:23 host sshd[21788]: Failed password for invalid user root from 49.88.112.114 port 22051 ssh2 Jan 10 15:52:23 host unix_chkpwd[21798]: password check failed for user (root) Jan 10 15:52:23 host sshd[21788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:52:25 host sshd[21788]: Failed password for invalid user root from 49.88.112.114 port 22051 ssh2 Jan 10 15:52:26 host unix_chkpwd[21801]: password check failed for user (root) Jan 10 15:52:26 host sshd[21788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 15:52:28 host sshd[21788]: Failed password for invalid user root from 49.88.112.114 port 22051 ssh2 Jan 10 15:52:29 host sshd[21788]: Received disconnect from 49.88.112.114 port 22051:11: [preauth] Jan 10 15:52:29 host sshd[21788]: Disconnected from 49.88.112.114 port 22051 [preauth] Jan 10 15:52:29 host sshd[21788]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114 user=root Jan 10 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 16:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y2ubAsY0vBHYsCbd.~ Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y2ubAsY0vBHYsCbd.~' Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y2ubAsY0vBHYsCbd.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 16:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 16:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 16:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 16:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 16:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 16:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 16:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 16:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 16:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 16:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 16:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 16:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 16:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 16:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 16:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 16:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 16:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 16:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 16:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 16:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 16:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 16:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 16:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 16:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 16:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 16:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 16:24:43 host sshd[27330]: Invalid user admin from 59.27.98.103 port 46655 Jan 10 16:24:43 host sshd[27330]: input_userauth_request: invalid user admin [preauth] Jan 10 16:24:43 host sshd[27330]: pam_unix(sshd:auth): check pass; user unknown Jan 10 16:24:43 host sshd[27330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.27.98.103 Jan 10 16:24:45 host sshd[27330]: Failed password for invalid user admin from 59.27.98.103 port 46655 ssh2 Jan 10 16:24:47 host sshd[27330]: Connection closed by 59.27.98.103 port 46655 [preauth] Jan 10 16:26:28 host sshd[27657]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 10 16:26:28 host sshd[27657]: input_userauth_request: invalid user root [preauth] Jan 10 16:26:28 host unix_chkpwd[27685]: password check failed for user (root) Jan 10 16:26:28 host sshd[27657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 10 16:26:28 host sshd[27657]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 16:26:30 host sshd[27657]: Failed password for invalid user root from 194.169.175.102 port 57915 ssh2 Jan 10 16:26:30 host sshd[27657]: Received disconnect from 194.169.175.102 port 57915:11: Client disconnecting normally [preauth] Jan 10 16:26:30 host sshd[27657]: Disconnected from 194.169.175.102 port 57915 [preauth] Jan 10 16:48:31 host sshd[31260]: Invalid user devops from 173.212.225.62 port 34698 Jan 10 16:48:31 host sshd[31260]: input_userauth_request: invalid user devops [preauth] Jan 10 16:48:31 host sshd[31260]: pam_unix(sshd:auth): check pass; user unknown Jan 10 16:48:31 host sshd[31260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 16:48:33 host sshd[31260]: Failed password for invalid user devops from 173.212.225.62 port 34698 ssh2 Jan 10 16:48:33 host sshd[31260]: Received disconnect from 173.212.225.62 port 34698:11: Bye Bye [preauth] Jan 10 16:48:33 host sshd[31260]: Disconnected from 173.212.225.62 port 34698 [preauth] Jan 10 16:59:55 host sshd[347]: User root from 37.139.4.138 not allowed because not listed in AllowUsers Jan 10 16:59:55 host sshd[347]: input_userauth_request: invalid user root [preauth] Jan 10 16:59:55 host unix_chkpwd[351]: password check failed for user (root) Jan 10 16:59:55 host sshd[347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.4.138 user=root Jan 10 16:59:55 host sshd[347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 16:59:57 host sshd[347]: Failed password for invalid user root from 37.139.4.138 port 52960 ssh2 Jan 10 16:59:57 host sshd[347]: Received disconnect from 37.139.4.138 port 52960:11: Bye Bye [preauth] Jan 10 16:59:57 host sshd[347]: Disconnected from 37.139.4.138 port 52960 [preauth] Jan 10 17:03:43 host sshd[994]: Connection closed by 113.21.232.39 port 36296 [preauth] Jan 10 17:05:06 host sshd[1163]: User root from 37.139.4.138 not allowed because not listed in AllowUsers Jan 10 17:05:06 host sshd[1163]: input_userauth_request: invalid user root [preauth] Jan 10 17:05:06 host unix_chkpwd[1169]: password check failed for user (root) Jan 10 17:05:06 host sshd[1163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.4.138 user=root Jan 10 17:05:06 host sshd[1163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 17:05:07 host sshd[1163]: Failed password for invalid user root from 37.139.4.138 port 50219 ssh2 Jan 10 17:05:08 host sshd[1163]: Received disconnect from 37.139.4.138 port 50219:11: Bye Bye [preauth] Jan 10 17:05:08 host sshd[1163]: Disconnected from 37.139.4.138 port 50219 [preauth] Jan 10 17:06:35 host sshd[1526]: Invalid user howard from 107.189.30.59 port 55332 Jan 10 17:06:35 host sshd[1526]: input_userauth_request: invalid user howard [preauth] Jan 10 17:06:35 host sshd[1526]: pam_unix(sshd:auth): check pass; user unknown Jan 10 17:06:35 host sshd[1526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 10 17:06:37 host sshd[1526]: Failed password for invalid user howard from 107.189.30.59 port 55332 ssh2 Jan 10 17:06:37 host sshd[1526]: Connection closed by 107.189.30.59 port 55332 [preauth] Jan 10 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=kottayamcalldriv user-8=phmetals user-9=gifterman user-10=palco123 user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 17:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b8B4MgxpHsuCQOJB.~ Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b8B4MgxpHsuCQOJB.~' Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b8B4MgxpHsuCQOJB.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 17:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 17:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 17:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 17:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 17:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 17:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 17:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 17:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 17:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 17:22:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 17:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 17:22:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 17:22:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 17:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 17:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 17:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 17:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 17:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 17:22:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 17:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 17:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 17:22:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 17:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 17:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 17:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 17:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 17:22:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 17:22:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 17:24:10 host sshd[4215]: Invalid user cc from 194.110.203.109 port 45030 Jan 10 17:24:10 host sshd[4215]: input_userauth_request: invalid user cc [preauth] Jan 10 17:24:10 host sshd[4215]: pam_unix(sshd:auth): check pass; user unknown Jan 10 17:24:10 host sshd[4215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 17:24:12 host sshd[4215]: Failed password for invalid user cc from 194.110.203.109 port 45030 ssh2 Jan 10 17:24:15 host sshd[4215]: pam_unix(sshd:auth): check pass; user unknown Jan 10 17:24:17 host sshd[4215]: Failed password for invalid user cc from 194.110.203.109 port 45030 ssh2 Jan 10 17:24:20 host sshd[4215]: pam_unix(sshd:auth): check pass; user unknown Jan 10 17:24:22 host sshd[4215]: Failed password for invalid user cc from 194.110.203.109 port 45030 ssh2 Jan 10 17:24:25 host sshd[4215]: Connection closed by 194.110.203.109 port 45030 [preauth] Jan 10 17:24:25 host sshd[4215]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 17:36:58 host sshd[5967]: Did not receive identification string from 167.71.166.243 port 50356 Jan 10 17:41:02 host sshd[6656]: Connection closed by 167.71.166.243 port 40966 [preauth] Jan 10 17:57:12 host sshd[9200]: Did not receive identification string from 87.236.176.250 port 47599 Jan 10 17:57:12 host sshd[9202]: Connection closed by 87.236.176.250 port 43325 [preauth] Jan 10 18:03:27 host sshd[10083]: Invalid user devops from 173.212.225.62 port 51896 Jan 10 18:03:27 host sshd[10083]: input_userauth_request: invalid user devops [preauth] Jan 10 18:03:28 host sshd[10083]: pam_unix(sshd:auth): check pass; user unknown Jan 10 18:03:28 host sshd[10083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 18:03:29 host sshd[10083]: Failed password for invalid user devops from 173.212.225.62 port 51896 ssh2 Jan 10 18:03:29 host sshd[10083]: Received disconnect from 173.212.225.62 port 51896:11: Bye Bye [preauth] Jan 10 18:03:29 host sshd[10083]: Disconnected from 173.212.225.62 port 51896 [preauth] Jan 10 18:11:10 host sshd[11233]: Connection closed by 45.79.181.223 port 30082 [preauth] Jan 10 18:11:12 host sshd[11238]: Connection closed by 45.79.181.223 port 30088 [preauth] Jan 10 18:11:15 host sshd[11245]: Connection closed by 45.79.181.223 port 30104 [preauth] Jan 10 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=wwwkapin user-20=woodpeck user-21=kottayamcalldriv user-22=phmetals user-23=palco123 user-24=gifterman user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 18:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9bDBgY5fhr1kJVZw.~ Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9bDBgY5fhr1kJVZw.~' Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9bDBgY5fhr1kJVZw.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 18:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 18:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 18:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 18:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 18:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 18:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 18:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 18:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 18:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 18:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 18:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 18:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 18:22:08 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 18:22:15 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 18:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 18:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 18:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 18:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 18:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 18:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 18:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 18:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 18:22:20 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 18:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 18:22:21 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 18:22:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 18:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 18:22:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 18:22:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 18:22:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 18:22:24 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 18:22:25 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 19:07:18 host sshd[19697]: Invalid user RPM from 62.233.50.248 port 44275 Jan 10 19:07:18 host sshd[19697]: input_userauth_request: invalid user RPM [preauth] Jan 10 19:07:18 host sshd[19697]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:07:18 host sshd[19697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 10 19:07:20 host sshd[19697]: Failed password for invalid user RPM from 62.233.50.248 port 44275 ssh2 Jan 10 19:07:20 host sshd[19697]: Received disconnect from 62.233.50.248 port 44275:11: Client disconnecting normally [preauth] Jan 10 19:07:20 host sshd[19697]: Disconnected from 62.233.50.248 port 44275 [preauth] Jan 10 19:07:21 host sshd[19704]: Invalid user admin from 62.233.50.248 port 47250 Jan 10 19:07:21 host sshd[19704]: input_userauth_request: invalid user admin [preauth] Jan 10 19:07:21 host sshd[19704]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:07:21 host sshd[19704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 10 19:07:23 host sshd[19704]: Failed password for invalid user admin from 62.233.50.248 port 47250 ssh2 Jan 10 19:07:23 host sshd[19704]: Received disconnect from 62.233.50.248 port 47250:11: Client disconnecting normally [preauth] Jan 10 19:07:23 host sshd[19704]: Disconnected from 62.233.50.248 port 47250 [preauth] Jan 10 19:07:24 host sshd[19709]: Invalid user solarus from 62.233.50.248 port 50236 Jan 10 19:07:24 host sshd[19709]: input_userauth_request: invalid user solarus [preauth] Jan 10 19:07:24 host sshd[19709]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:07:24 host sshd[19709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 10 19:07:26 host sshd[19709]: Failed password for invalid user solarus from 62.233.50.248 port 50236 ssh2 Jan 10 19:14:57 host sshd[20723]: Invalid user admin from 115.70.219.46 port 48692 Jan 10 19:14:57 host sshd[20723]: input_userauth_request: invalid user admin [preauth] Jan 10 19:14:57 host sshd[20723]: Failed none for invalid user admin from 115.70.219.46 port 48692 ssh2 Jan 10 19:14:58 host sshd[20723]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:14:58 host sshd[20723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.70.219.46 Jan 10 19:15:00 host sshd[20723]: Failed password for invalid user admin from 115.70.219.46 port 48692 ssh2 Jan 10 19:15:00 host sshd[20723]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:15:02 host sshd[20723]: Failed password for invalid user admin from 115.70.219.46 port 48692 ssh2 Jan 10 19:15:02 host sshd[20723]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:15:04 host sshd[20723]: Failed password for invalid user admin from 115.70.219.46 port 48692 ssh2 Jan 10 19:15:05 host sshd[20723]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:15:06 host sshd[20723]: Failed password for invalid user admin from 115.70.219.46 port 48692 ssh2 Jan 10 19:15:07 host sshd[20723]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:15:09 host sshd[20723]: Failed password for invalid user admin from 115.70.219.46 port 48692 ssh2 Jan 10 19:15:09 host sshd[20723]: error: maximum authentication attempts exceeded for invalid user admin from 115.70.219.46 port 48692 ssh2 [preauth] Jan 10 19:15:09 host sshd[20723]: Disconnecting: Too many authentication failures [preauth] Jan 10 19:15:09 host sshd[20723]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.70.219.46 Jan 10 19:15:09 host sshd[20723]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 10 19:15:10 host sshd[20761]: Connection closed by 115.70.219.46 port 36871 [preauth] Jan 10 19:17:40 host sshd[21063]: Invalid user ansible from 173.212.225.62 port 40884 Jan 10 19:17:40 host sshd[21063]: input_userauth_request: invalid user ansible [preauth] Jan 10 19:17:40 host sshd[21063]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:17:40 host sshd[21063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 19:17:42 host sshd[21063]: Failed password for invalid user ansible from 173.212.225.62 port 40884 ssh2 Jan 10 19:17:42 host sshd[21063]: Received disconnect from 173.212.225.62 port 40884:11: Bye Bye [preauth] Jan 10 19:17:42 host sshd[21063]: Disconnected from 173.212.225.62 port 40884 [preauth] Jan 10 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwrmswll user-10=keralaholi user-11=wwwresourcehunte user-12=wwwkmaorg user-13=disposeat user-14=remysagr user-15=wwwkapin user-16=woodpeck user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=kottayamcalldriv user-26=phmetals user-27=gifterman user-28=palco123 user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 19:22:14 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L1PtzRRbxyMtMEeG.~ Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L1PtzRRbxyMtMEeG.~' Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-L1PtzRRbxyMtMEeG.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 19:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 19:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 19:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 19:22:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 19:22:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 19:22:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 19:22:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 19:22:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 19:22:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 19:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 19:22:17 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 19:22:18 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 19:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 19:22:18 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 19:22:20 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 19:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 19:22:20 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 19:22:25 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 19:22:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 19:22:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 19:22:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 19:22:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 19:22:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 19:22:28 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 19:22:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 19:22:28 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 19:22:33 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 19:22:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 19:22:33 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 19:22:34 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 19:22:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 19:22:34 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 19:22:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 19:22:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 19:22:36 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 19:22:37 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 19:24:55 host sshd[22591]: Invalid user pi from 90.187.84.153 port 53790 Jan 10 19:24:55 host sshd[22591]: input_userauth_request: invalid user pi [preauth] Jan 10 19:24:55 host sshd[22592]: Invalid user pi from 90.187.84.153 port 53794 Jan 10 19:24:55 host sshd[22592]: input_userauth_request: invalid user pi [preauth] Jan 10 19:24:55 host sshd[22591]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:24:55 host sshd[22591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.187.84.153 Jan 10 19:24:55 host sshd[22592]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:24:55 host sshd[22592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.187.84.153 Jan 10 19:24:57 host sshd[22591]: Failed password for invalid user pi from 90.187.84.153 port 53790 ssh2 Jan 10 19:24:57 host sshd[22592]: Failed password for invalid user pi from 90.187.84.153 port 53794 ssh2 Jan 10 19:24:57 host sshd[22591]: Connection closed by 90.187.84.153 port 53790 [preauth] Jan 10 19:24:57 host sshd[22592]: Connection closed by 90.187.84.153 port 53794 [preauth] Jan 10 19:25:54 host sshd[22801]: Invalid user cd from 194.110.203.109 port 40334 Jan 10 19:25:54 host sshd[22801]: input_userauth_request: invalid user cd [preauth] Jan 10 19:25:54 host sshd[22801]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:25:54 host sshd[22801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 19:25:55 host sshd[22801]: Failed password for invalid user cd from 194.110.203.109 port 40334 ssh2 Jan 10 19:25:58 host sshd[22801]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:26:00 host sshd[22801]: Failed password for invalid user cd from 194.110.203.109 port 40334 ssh2 Jan 10 19:26:03 host sshd[22801]: pam_unix(sshd:auth): check pass; user unknown Jan 10 19:26:05 host sshd[22801]: Failed password for invalid user cd from 194.110.203.109 port 40334 ssh2 Jan 10 19:26:08 host sshd[22801]: Connection closed by 194.110.203.109 port 40334 [preauth] Jan 10 19:26:08 host sshd[22801]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=kottayamcalldriv user-24=phmetals user-25=gifterman user-26=palco123 user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 20:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jVidGUZecMe6HqqU.~ Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jVidGUZecMe6HqqU.~' Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jVidGUZecMe6HqqU.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 20:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 20:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 20:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 20:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 20:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 20:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 20:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 20:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 20:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 20:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 20:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 20:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 20:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 20:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 20:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 20:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 20:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 20:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 20:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 20:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 20:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 20:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 20:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 20:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 20:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 20:31:34 host sshd[1378]: Invalid user ansible from 173.212.225.62 port 58078 Jan 10 20:31:34 host sshd[1378]: input_userauth_request: invalid user ansible [preauth] Jan 10 20:31:34 host sshd[1378]: pam_unix(sshd:auth): check pass; user unknown Jan 10 20:31:34 host sshd[1378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.225.62 Jan 10 20:31:36 host sshd[1378]: Failed password for invalid user ansible from 173.212.225.62 port 58078 ssh2 Jan 10 20:31:36 host sshd[1378]: Received disconnect from 173.212.225.62 port 58078:11: Bye Bye [preauth] Jan 10 20:31:36 host sshd[1378]: Disconnected from 173.212.225.62 port 58078 [preauth] Jan 10 21:00:29 host sshd[5448]: User root from 45.234.242.249 not allowed because not listed in AllowUsers Jan 10 21:00:29 host sshd[5448]: input_userauth_request: invalid user root [preauth] Jan 10 21:00:29 host unix_chkpwd[5473]: password check failed for user (root) Jan 10 21:00:29 host sshd[5448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.234.242.249 user=root Jan 10 21:00:29 host sshd[5448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 21:00:31 host sshd[5448]: Failed password for invalid user root from 45.234.242.249 port 51142 ssh2 Jan 10 21:00:31 host sshd[5448]: Received disconnect from 45.234.242.249 port 51142:11: Bye Bye [preauth] Jan 10 21:00:31 host sshd[5448]: Disconnected from 45.234.242.249 port 51142 [preauth] Jan 10 21:03:54 host sshd[5893]: User root from 192.227.174.167 not allowed because not listed in AllowUsers Jan 10 21:03:54 host sshd[5893]: input_userauth_request: invalid user root [preauth] Jan 10 21:03:54 host unix_chkpwd[5900]: password check failed for user (root) Jan 10 21:03:54 host sshd[5893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.174.167 user=root Jan 10 21:03:54 host sshd[5893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 21:03:56 host sshd[5893]: Failed password for invalid user root from 192.227.174.167 port 36314 ssh2 Jan 10 21:03:56 host sshd[5893]: Received disconnect from 192.227.174.167 port 36314:11: Bye Bye [preauth] Jan 10 21:03:56 host sshd[5893]: Disconnected from 192.227.174.167 port 36314 [preauth] Jan 10 21:04:11 host sshd[5930]: User root from 45.234.242.249 not allowed because not listed in AllowUsers Jan 10 21:04:11 host sshd[5930]: input_userauth_request: invalid user root [preauth] Jan 10 21:04:11 host unix_chkpwd[5934]: password check failed for user (root) Jan 10 21:04:11 host sshd[5930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.234.242.249 user=root Jan 10 21:04:11 host sshd[5930]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 21:04:13 host sshd[5930]: Failed password for invalid user root from 45.234.242.249 port 50461 ssh2 Jan 10 21:04:13 host sshd[5930]: Received disconnect from 45.234.242.249 port 50461:11: Bye Bye [preauth] Jan 10 21:04:13 host sshd[5930]: Disconnected from 45.234.242.249 port 50461 [preauth] Jan 10 21:07:08 host sshd[6412]: User root from 192.227.174.167 not allowed because not listed in AllowUsers Jan 10 21:07:08 host sshd[6412]: input_userauth_request: invalid user root [preauth] Jan 10 21:07:08 host unix_chkpwd[6415]: password check failed for user (root) Jan 10 21:07:08 host sshd[6412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.174.167 user=root Jan 10 21:07:08 host sshd[6412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 21:07:09 host sshd[6412]: Failed password for invalid user root from 192.227.174.167 port 49632 ssh2 Jan 10 21:07:09 host sshd[6412]: Received disconnect from 192.227.174.167 port 49632:11: Bye Bye [preauth] Jan 10 21:07:09 host sshd[6412]: Disconnected from 192.227.174.167 port 49632 [preauth] Jan 10 21:12:40 host sshd[7179]: Connection closed by 159.203.240.17 port 35750 [preauth] Jan 10 21:15:29 host sshd[7494]: Invalid user cat from 67.205.135.136 port 39966 Jan 10 21:15:29 host sshd[7494]: input_userauth_request: invalid user cat [preauth] Jan 10 21:15:30 host sshd[7494]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:15:30 host sshd[7494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.136 Jan 10 21:15:32 host sshd[7494]: Failed password for invalid user cat from 67.205.135.136 port 39966 ssh2 Jan 10 21:15:32 host sshd[7494]: Received disconnect from 67.205.135.136 port 39966:11: Bye Bye [preauth] Jan 10 21:15:32 host sshd[7494]: Disconnected from 67.205.135.136 port 39966 [preauth] Jan 10 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=mrsclean user-11=wwwnexidigital user-12=kottayamcalldriv user-13=phmetals user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 21:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8SCzb9y2t0m4IHXI.~ Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8SCzb9y2t0m4IHXI.~' Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8SCzb9y2t0m4IHXI.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 21:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 21:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 21:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 21:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 21:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 21:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 21:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 21:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 21:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 21:22:08 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 21:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 21:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 21:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 21:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 21:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 21:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 21:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 21:22:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 21:22:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 21:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 21:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 21:22:16 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 21:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 21:22:16 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 21:22:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 21:22:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 21:22:23 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 21:22:25 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 21:24:14 host sshd[8949]: Invalid user ce from 194.110.203.109 port 57214 Jan 10 21:24:14 host sshd[8949]: input_userauth_request: invalid user ce [preauth] Jan 10 21:24:14 host sshd[8949]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:24:14 host sshd[8949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 21:24:16 host sshd[8949]: Failed password for invalid user ce from 194.110.203.109 port 57214 ssh2 Jan 10 21:24:20 host sshd[8949]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:24:21 host sshd[8949]: Failed password for invalid user ce from 194.110.203.109 port 57214 ssh2 Jan 10 21:24:24 host sshd[8949]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:24:27 host sshd[8949]: Failed password for invalid user ce from 194.110.203.109 port 57214 ssh2 Jan 10 21:24:30 host sshd[8949]: Connection closed by 194.110.203.109 port 57214 [preauth] Jan 10 21:24:30 host sshd[8949]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 21:34:57 host sshd[10353]: Did not receive identification string from 64.227.181.236 port 61000 Jan 10 21:40:18 host sshd[11213]: Did not receive identification string from 111.67.202.249 port 50514 Jan 10 21:40:20 host sshd[11216]: Invalid user builder from 111.67.202.249 port 58786 Jan 10 21:40:20 host sshd[11216]: input_userauth_request: invalid user builder [preauth] Jan 10 21:40:20 host sshd[11215]: Invalid user account1 from 111.67.202.249 port 58770 Jan 10 21:40:20 host sshd[11215]: input_userauth_request: invalid user account1 [preauth] Jan 10 21:40:20 host sshd[11217]: Invalid user lanou from 111.67.202.249 port 58746 Jan 10 21:40:20 host sshd[11217]: input_userauth_request: invalid user lanou [preauth] Jan 10 21:40:20 host sshd[11218]: Invalid user daenon from 111.67.202.249 port 58716 Jan 10 21:40:20 host sshd[11220]: Invalid user alex from 111.67.202.249 port 58720 Jan 10 21:40:20 host sshd[11218]: input_userauth_request: invalid user daenon [preauth] Jan 10 21:40:20 host sshd[11220]: input_userauth_request: invalid user alex [preauth] Jan 10 21:40:20 host sshd[11223]: Invalid user admin from 111.67.202.249 port 58766 Jan 10 21:40:20 host sshd[11223]: input_userauth_request: invalid user admin [preauth] Jan 10 21:40:20 host sshd[11225]: Invalid user steam from 111.67.202.249 port 58764 Jan 10 21:40:20 host sshd[11225]: input_userauth_request: invalid user steam [preauth] Jan 10 21:40:20 host sshd[11222]: Invalid user zjw from 111.67.202.249 port 58750 Jan 10 21:40:20 host sshd[11222]: input_userauth_request: invalid user zjw [preauth] Jan 10 21:40:20 host sshd[11228]: Invalid user testuser from 111.67.202.249 port 58738 Jan 10 21:40:20 host sshd[11228]: input_userauth_request: invalid user testuser [preauth] Jan 10 21:40:20 host sshd[11227]: Invalid user natasha from 111.67.202.249 port 58748 Jan 10 21:40:20 host sshd[11227]: input_userauth_request: invalid user natasha [preauth] Jan 10 21:40:20 host sshd[11229]: Invalid user openhabian from 111.67.202.249 port 58740 Jan 10 21:40:20 host sshd[11229]: input_userauth_request: invalid user openhabian [preauth] Jan 10 21:40:20 host sshd[11230]: Invalid user bluecat from 111.67.202.249 port 58718 Jan 10 21:40:20 host sshd[11230]: input_userauth_request: invalid user bluecat [preauth] Jan 10 21:40:20 host sshd[11242]: Invalid user guest from 111.67.202.249 port 58774 Jan 10 21:40:20 host sshd[11242]: input_userauth_request: invalid user guest [preauth] Jan 10 21:40:20 host sshd[11231]: Invalid user ansadmin from 111.67.202.249 port 58760 Jan 10 21:40:20 host sshd[11231]: input_userauth_request: invalid user ansadmin [preauth] Jan 10 21:40:20 host sshd[11235]: Invalid user q from 111.67.202.249 port 58762 Jan 10 21:40:20 host sshd[11235]: input_userauth_request: invalid user q [preauth] Jan 10 21:40:20 host sshd[11237]: User root from 111.67.202.249 not allowed because not listed in AllowUsers Jan 10 21:40:20 host sshd[11237]: input_userauth_request: invalid user root [preauth] Jan 10 21:40:20 host sshd[11216]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:20 host sshd[11216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:20 host sshd[11224]: User root from 111.67.202.249 not allowed because not listed in AllowUsers Jan 10 21:40:20 host sshd[11224]: input_userauth_request: invalid user root [preauth] Jan 10 21:40:20 host sshd[11219]: Invalid user ansible from 111.67.202.249 port 58756 Jan 10 21:40:20 host sshd[11219]: input_userauth_request: invalid user ansible [preauth] Jan 10 21:40:20 host sshd[11215]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:20 host sshd[11215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11217]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11218]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11220]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11223]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11222]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11228]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11225]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11219]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11231]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11229]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11230]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11235]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11242]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host sshd[11227]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:21 host sshd[11227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:21 host unix_chkpwd[11258]: password check failed for user (root) Jan 10 21:40:21 host sshd[11224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 user=root Jan 10 21:40:21 host sshd[11224]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 21:40:21 host unix_chkpwd[11259]: password check failed for user (root) Jan 10 21:40:21 host sshd[11237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 user=root Jan 10 21:40:21 host sshd[11237]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 21:40:22 host sshd[11252]: Invalid user vm from 111.67.202.249 port 58788 Jan 10 21:40:22 host sshd[11252]: input_userauth_request: invalid user vm [preauth] Jan 10 21:40:22 host sshd[11253]: Invalid user station3 from 111.67.202.249 port 58794 Jan 10 21:40:22 host sshd[11253]: input_userauth_request: invalid user station3 [preauth] Jan 10 21:40:22 host sshd[11252]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:22 host sshd[11252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:22 host sshd[11253]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:40:22 host sshd[11253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.202.249 Jan 10 21:40:22 host sshd[11216]: Failed password for invalid user builder from 111.67.202.249 port 58786 ssh2 Jan 10 21:40:22 host sshd[11215]: Failed password for invalid user account1 from 111.67.202.249 port 58770 ssh2 Jan 10 21:40:23 host sshd[11217]: Failed password for invalid user lanou from 111.67.202.249 port 58746 ssh2 Jan 10 21:40:23 host sshd[11220]: Failed password for invalid user alex from 111.67.202.249 port 58720 ssh2 Jan 10 21:40:23 host sshd[11218]: Failed password for invalid user daenon from 111.67.202.249 port 58716 ssh2 Jan 10 21:40:23 host sshd[11223]: Failed password for invalid user admin from 111.67.202.249 port 58766 ssh2 Jan 10 21:40:23 host sshd[11222]: Failed password for invalid user zjw from 111.67.202.249 port 58750 ssh2 Jan 10 21:40:23 host sshd[11228]: Failed password for invalid user testuser from 111.67.202.249 port 58738 ssh2 Jan 10 21:40:23 host sshd[11225]: Failed password for invalid user steam from 111.67.202.249 port 58764 ssh2 Jan 10 21:40:23 host sshd[11219]: Failed password for invalid user ansible from 111.67.202.249 port 58756 ssh2 Jan 10 21:40:23 host sshd[11231]: Failed password for invalid user ansadmin from 111.67.202.249 port 58760 ssh2 Jan 10 21:40:23 host sshd[11229]: Failed password for invalid user openhabian from 111.67.202.249 port 58740 ssh2 Jan 10 21:40:23 host sshd[11230]: Failed password for invalid user bluecat from 111.67.202.249 port 58718 ssh2 Jan 10 21:40:23 host sshd[11235]: Failed password for invalid user q from 111.67.202.249 port 58762 ssh2 Jan 10 21:40:23 host sshd[11242]: Failed password for invalid user guest from 111.67.202.249 port 58774 ssh2 Jan 10 21:40:23 host sshd[11227]: Failed password for invalid user natasha from 111.67.202.249 port 58748 ssh2 Jan 10 21:40:23 host sshd[11224]: Failed password for invalid user root from 111.67.202.249 port 58772 ssh2 Jan 10 21:40:23 host sshd[11237]: Failed password for invalid user root from 111.67.202.249 port 58722 ssh2 Jan 10 21:40:24 host sshd[11252]: Failed password for invalid user vm from 111.67.202.249 port 58788 ssh2 Jan 10 21:40:24 host sshd[11253]: Failed password for invalid user station3 from 111.67.202.249 port 58794 ssh2 Jan 10 21:46:02 host sshd[12019]: Invalid user ttx from 67.205.135.136 port 55094 Jan 10 21:46:02 host sshd[12019]: input_userauth_request: invalid user ttx [preauth] Jan 10 21:46:03 host sshd[12019]: pam_unix(sshd:auth): check pass; user unknown Jan 10 21:46:03 host sshd[12019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.136 Jan 10 21:46:05 host sshd[12019]: Failed password for invalid user ttx from 67.205.135.136 port 55094 ssh2 Jan 10 21:46:05 host sshd[12019]: Received disconnect from 67.205.135.136 port 55094:11: Bye Bye [preauth] Jan 10 21:46:05 host sshd[12019]: Disconnected from 67.205.135.136 port 55094 [preauth] Jan 10 22:07:05 host sshd[14989]: Invalid user eugene from 107.189.30.59 port 41792 Jan 10 22:07:05 host sshd[14989]: input_userauth_request: invalid user eugene [preauth] Jan 10 22:07:05 host sshd[14989]: pam_unix(sshd:auth): check pass; user unknown Jan 10 22:07:05 host sshd[14989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 10 22:07:07 host sshd[14989]: Failed password for invalid user eugene from 107.189.30.59 port 41792 ssh2 Jan 10 22:07:08 host sshd[14989]: Connection closed by 107.189.30.59 port 41792 [preauth] Jan 10 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=wwwtestugo user-3=shalinijames user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=mrsclean user-11=wwwnexidigital user-12=kottayamcalldriv user-13=phmetals user-14=gifterman user-15=palco123 user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=wwwkaretakers user-24=cochintaxi user-25=ugotscom user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 22:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PyT0AdCb9XoMceOJ.~ Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PyT0AdCb9XoMceOJ.~' Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PyT0AdCb9XoMceOJ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 22:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 22:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 22:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 22:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 22:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 22:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 22:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 22:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 22:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 22:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 22:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 22:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 22:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 22:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 22:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 22:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 22:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 22:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 22:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 22:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 22:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 22:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 22:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 22:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 22:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 22:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 23:06:33 host sshd[23521]: Did not receive identification string from 167.71.166.243 port 48236 Jan 10 23:08:42 host sshd[23879]: User root from 36.91.152.162 not allowed because not listed in AllowUsers Jan 10 23:08:42 host sshd[23879]: input_userauth_request: invalid user root [preauth] Jan 10 23:08:42 host unix_chkpwd[23882]: password check failed for user (root) Jan 10 23:08:42 host sshd[23879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.152.162 user=root Jan 10 23:08:42 host sshd[23879]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 23:08:44 host sshd[23879]: Failed password for invalid user root from 36.91.152.162 port 43956 ssh2 Jan 10 23:08:45 host sshd[23879]: Received disconnect from 36.91.152.162 port 43956:11: Bye Bye [preauth] Jan 10 23:08:45 host sshd[23879]: Disconnected from 36.91.152.162 port 43956 [preauth] Jan 10 23:15:08 host sshd[24891]: Connection closed by 167.71.166.243 port 52928 [preauth] Jan 10 23:16:57 host sshd[25177]: User root from 36.91.152.162 not allowed because not listed in AllowUsers Jan 10 23:16:57 host sshd[25177]: input_userauth_request: invalid user root [preauth] Jan 10 23:16:57 host unix_chkpwd[25181]: password check failed for user (root) Jan 10 23:16:57 host sshd[25177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.152.162 user=root Jan 10 23:16:57 host sshd[25177]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 10 23:17:00 host sshd[25177]: Failed password for invalid user root from 36.91.152.162 port 36186 ssh2 Jan 10 23:17:00 host sshd[25177]: Received disconnect from 36.91.152.162 port 36186:11: Bye Bye [preauth] Jan 10 23:17:00 host sshd[25177]: Disconnected from 36.91.152.162 port 36186 [preauth] Jan 10 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwrmswll user-5=keralaholi user-6=wwwresourcehunte user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=phmetals user-17=kottayamcalldriv user-18=gifterman user-19=palco123 user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=wwwtestugo user-28=shalinijames user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 10 23:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-igXFXV1Ihv6qldMw.~ Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-igXFXV1Ihv6qldMw.~' Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-igXFXV1Ihv6qldMw.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 23:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 10 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 10 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 10 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 10 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 10 23:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 10 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 10 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 10 23:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 10 23:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 10 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 10 23:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 10 23:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 10 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 10 23:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 10 23:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 10 23:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 10 23:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 23:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 23:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 10 23:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 23:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 23:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 10 23:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 10 23:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 10 23:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 10 23:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 23:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 23:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 10 23:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 10 23:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 10 23:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 10 23:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 10 23:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 10 23:34:06 host sshd[27879]: Invalid user cf from 194.110.203.109 port 52332 Jan 10 23:34:06 host sshd[27879]: input_userauth_request: invalid user cf [preauth] Jan 10 23:34:06 host sshd[27879]: pam_unix(sshd:auth): check pass; user unknown Jan 10 23:34:06 host sshd[27879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 10 23:34:07 host sshd[27879]: Failed password for invalid user cf from 194.110.203.109 port 52332 ssh2 Jan 10 23:34:10 host sshd[27879]: pam_unix(sshd:auth): check pass; user unknown Jan 10 23:34:12 host sshd[27879]: Failed password for invalid user cf from 194.110.203.109 port 52332 ssh2 Jan 10 23:34:15 host sshd[27879]: pam_unix(sshd:auth): check pass; user unknown Jan 10 23:34:18 host sshd[27879]: Failed password for invalid user cf from 194.110.203.109 port 52332 ssh2 Jan 10 23:34:21 host sshd[27879]: Connection closed by 194.110.203.109 port 52332 [preauth] Jan 10 23:34:21 host sshd[27879]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 00:13:26 host sshd[1228]: Connection closed by 45.79.181.223 port 35002 [preauth] Jan 11 00:13:28 host sshd[1234]: Connection closed by 45.79.181.223 port 57920 [preauth] Jan 11 00:13:31 host sshd[1241]: Connection closed by 45.79.181.223 port 57926 [preauth] Jan 11 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=kottayamcalldriv user-4=phmetals user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=straightcurve user-10=wwwletsstalkfood user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=remysagr user-16=wwwkmaorg user-17=disposeat user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 00:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Hl3GGjSNzFnDhXd3.~ Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Hl3GGjSNzFnDhXd3.~' Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Hl3GGjSNzFnDhXd3.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 00:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 00:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 00:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 11 00:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 00:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 11 00:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 00:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 11 00:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 00:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 00:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 11 00:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 00:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 00:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 11 00:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 00:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 00:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 11 00:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 00:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 00:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 11 00:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 00:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 00:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 11 00:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 00:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 00:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 11 00:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 00:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 00:29:20 host sshd[5296]: Did not receive identification string from 43.157.7.25 port 47772 Jan 11 00:33:42 host sshd[6051]: Invalid user weijianjun from 187.63.96.120 port 38356 Jan 11 00:33:42 host sshd[6051]: input_userauth_request: invalid user weijianjun [preauth] Jan 11 00:33:42 host sshd[6051]: pam_unix(sshd:auth): check pass; user unknown Jan 11 00:33:42 host sshd[6051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.63.96.120 Jan 11 00:33:44 host sshd[6051]: Failed password for invalid user weijianjun from 187.63.96.120 port 38356 ssh2 Jan 11 00:33:44 host sshd[6051]: Received disconnect from 187.63.96.120 port 38356:11: Normal Shutdown, Thank you for playing [preauth] Jan 11 00:33:44 host sshd[6051]: Disconnected from 187.63.96.120 port 38356 [preauth] Jan 11 00:35:20 host sshd[6396]: User root from 119.1.97.214 not allowed because not listed in AllowUsers Jan 11 00:35:20 host sshd[6396]: input_userauth_request: invalid user root [preauth] Jan 11 00:35:20 host unix_chkpwd[6401]: password check failed for user (root) Jan 11 00:35:20 host sshd[6396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.1.97.214 user=root Jan 11 00:35:20 host sshd[6396]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 00:35:22 host sshd[6396]: Failed password for invalid user root from 119.1.97.214 port 2405 ssh2 Jan 11 00:35:23 host sshd[6396]: Connection reset by 119.1.97.214 port 2405 [preauth] Jan 11 01:02:10 host sshd[10360]: Invalid user postgres from 187.63.96.120 port 46172 Jan 11 01:02:10 host sshd[10360]: input_userauth_request: invalid user postgres [preauth] Jan 11 01:02:10 host sshd[10360]: pam_unix(sshd:auth): check pass; user unknown Jan 11 01:02:10 host sshd[10360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.63.96.120 Jan 11 01:02:13 host sshd[10360]: Failed password for invalid user postgres from 187.63.96.120 port 46172 ssh2 Jan 11 01:02:13 host sshd[10360]: Received disconnect from 187.63.96.120 port 46172:11: Normal Shutdown, Thank you for playing [preauth] Jan 11 01:02:13 host sshd[10360]: Disconnected from 187.63.96.120 port 46172 [preauth] Jan 11 01:02:18 host sshd[10369]: User root from 167.99.89.165 not allowed because not listed in AllowUsers Jan 11 01:02:18 host sshd[10369]: input_userauth_request: invalid user root [preauth] Jan 11 01:02:18 host unix_chkpwd[10372]: password check failed for user (root) Jan 11 01:02:18 host sshd[10369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.89.165 user=root Jan 11 01:02:18 host sshd[10369]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:02:19 host sshd[10369]: Failed password for invalid user root from 167.99.89.165 port 39228 ssh2 Jan 11 01:02:19 host sshd[10369]: Received disconnect from 167.99.89.165 port 39228:11: Bye Bye [preauth] Jan 11 01:02:19 host sshd[10369]: Disconnected from 167.99.89.165 port 39228 [preauth] Jan 11 01:02:38 host sshd[10412]: User root from 143.255.141.251 not allowed because not listed in AllowUsers Jan 11 01:02:38 host sshd[10412]: input_userauth_request: invalid user root [preauth] Jan 11 01:02:38 host unix_chkpwd[10416]: password check failed for user (root) Jan 11 01:02:38 host sshd[10412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.141.251 user=root Jan 11 01:02:38 host sshd[10412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:02:39 host sshd[10412]: Failed password for invalid user root from 143.255.141.251 port 42508 ssh2 Jan 11 01:02:40 host sshd[10412]: Received disconnect from 143.255.141.251 port 42508:11: Bye Bye [preauth] Jan 11 01:02:40 host sshd[10412]: Disconnected from 143.255.141.251 port 42508 [preauth] Jan 11 01:03:11 host sshd[10466]: User root from 200.70.56.203 not allowed because not listed in AllowUsers Jan 11 01:03:11 host sshd[10466]: input_userauth_request: invalid user root [preauth] Jan 11 01:03:11 host unix_chkpwd[10469]: password check failed for user (root) Jan 11 01:03:11 host sshd[10466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.203 user=root Jan 11 01:03:11 host sshd[10466]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:03:14 host sshd[10466]: Failed password for invalid user root from 200.70.56.203 port 34976 ssh2 Jan 11 01:03:14 host sshd[10466]: Received disconnect from 200.70.56.203 port 34976:11: Bye Bye [preauth] Jan 11 01:03:14 host sshd[10466]: Disconnected from 200.70.56.203 port 34976 [preauth] Jan 11 01:05:25 host sshd[10704]: User root from 162.241.114.75 not allowed because not listed in AllowUsers Jan 11 01:05:25 host sshd[10704]: input_userauth_request: invalid user root [preauth] Jan 11 01:05:25 host unix_chkpwd[10708]: password check failed for user (root) Jan 11 01:05:25 host sshd[10704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.114.75 user=root Jan 11 01:05:25 host sshd[10704]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:05:25 host sshd[10709]: User root from 178.128.122.222 not allowed because not listed in AllowUsers Jan 11 01:05:25 host sshd[10709]: input_userauth_request: invalid user root [preauth] Jan 11 01:05:25 host unix_chkpwd[10711]: password check failed for user (root) Jan 11 01:05:25 host sshd[10709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.122.222 user=root Jan 11 01:05:25 host sshd[10709]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:05:27 host sshd[10704]: Failed password for invalid user root from 162.241.114.75 port 37288 ssh2 Jan 11 01:05:27 host sshd[10704]: Received disconnect from 162.241.114.75 port 37288:11: Bye Bye [preauth] Jan 11 01:05:27 host sshd[10704]: Disconnected from 162.241.114.75 port 37288 [preauth] Jan 11 01:05:27 host sshd[10709]: Failed password for invalid user root from 178.128.122.222 port 51868 ssh2 Jan 11 01:05:27 host sshd[10709]: Received disconnect from 178.128.122.222 port 51868:11: Bye Bye [preauth] Jan 11 01:05:27 host sshd[10709]: Disconnected from 178.128.122.222 port 51868 [preauth] Jan 11 01:06:16 host sshd[10928]: User root from 202.89.77.254 not allowed because not listed in AllowUsers Jan 11 01:06:16 host sshd[10928]: input_userauth_request: invalid user root [preauth] Jan 11 01:06:16 host unix_chkpwd[10930]: password check failed for user (root) Jan 11 01:06:16 host sshd[10928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.89.77.254 user=root Jan 11 01:06:16 host sshd[10928]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:06:18 host sshd[10928]: Failed password for invalid user root from 202.89.77.254 port 50202 ssh2 Jan 11 01:06:18 host sshd[10928]: Received disconnect from 202.89.77.254 port 50202:11: Bye Bye [preauth] Jan 11 01:06:18 host sshd[10928]: Disconnected from 202.89.77.254 port 50202 [preauth] Jan 11 01:06:19 host sshd[10938]: User root from 101.32.76.28 not allowed because not listed in AllowUsers Jan 11 01:06:19 host sshd[10938]: input_userauth_request: invalid user root [preauth] Jan 11 01:06:19 host unix_chkpwd[10940]: password check failed for user (root) Jan 11 01:06:19 host sshd[10938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.76.28 user=root Jan 11 01:06:19 host sshd[10938]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:06:22 host sshd[10938]: Failed password for invalid user root from 101.32.76.28 port 34982 ssh2 Jan 11 01:06:22 host sshd[10938]: Received disconnect from 101.32.76.28 port 34982:11: Bye Bye [preauth] Jan 11 01:06:22 host sshd[10938]: Disconnected from 101.32.76.28 port 34982 [preauth] Jan 11 01:07:07 host sshd[11023]: User root from 167.99.89.165 not allowed because not listed in AllowUsers Jan 11 01:07:07 host sshd[11023]: input_userauth_request: invalid user root [preauth] Jan 11 01:07:07 host unix_chkpwd[11026]: password check failed for user (root) Jan 11 01:07:07 host sshd[11023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.89.165 user=root Jan 11 01:07:07 host sshd[11023]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:07:09 host sshd[11023]: Failed password for invalid user root from 167.99.89.165 port 46486 ssh2 Jan 11 01:07:40 host sshd[11110]: User root from 162.241.114.75 not allowed because not listed in AllowUsers Jan 11 01:07:40 host sshd[11110]: input_userauth_request: invalid user root [preauth] Jan 11 01:07:40 host unix_chkpwd[11113]: password check failed for user (root) Jan 11 01:07:40 host sshd[11110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.114.75 user=root Jan 11 01:07:40 host sshd[11110]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:07:42 host sshd[11110]: Failed password for invalid user root from 162.241.114.75 port 34856 ssh2 Jan 11 01:07:43 host sshd[11110]: Received disconnect from 162.241.114.75 port 34856:11: Bye Bye [preauth] Jan 11 01:07:43 host sshd[11110]: Disconnected from 162.241.114.75 port 34856 [preauth] Jan 11 01:08:11 host sshd[11197]: User root from 202.89.77.254 not allowed because not listed in AllowUsers Jan 11 01:08:11 host sshd[11197]: input_userauth_request: invalid user root [preauth] Jan 11 01:08:11 host unix_chkpwd[11199]: password check failed for user (root) Jan 11 01:08:11 host sshd[11197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.89.77.254 user=root Jan 11 01:08:11 host sshd[11197]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:08:13 host sshd[11197]: Failed password for invalid user root from 202.89.77.254 port 45246 ssh2 Jan 11 01:08:13 host sshd[11197]: Received disconnect from 202.89.77.254 port 45246:11: Bye Bye [preauth] Jan 11 01:08:13 host sshd[11197]: Disconnected from 202.89.77.254 port 45246 [preauth] Jan 11 01:08:39 host sshd[11283]: User root from 200.70.56.203 not allowed because not listed in AllowUsers Jan 11 01:08:39 host sshd[11283]: input_userauth_request: invalid user root [preauth] Jan 11 01:08:39 host unix_chkpwd[11287]: password check failed for user (root) Jan 11 01:08:39 host sshd[11283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.203 user=root Jan 11 01:08:39 host sshd[11283]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:08:41 host sshd[11283]: Failed password for invalid user root from 200.70.56.203 port 33764 ssh2 Jan 11 01:08:42 host sshd[11283]: Received disconnect from 200.70.56.203 port 33764:11: Bye Bye [preauth] Jan 11 01:08:42 host sshd[11283]: Disconnected from 200.70.56.203 port 33764 [preauth] Jan 11 01:08:45 host sshd[11328]: User root from 101.32.76.28 not allowed because not listed in AllowUsers Jan 11 01:08:45 host sshd[11328]: input_userauth_request: invalid user root [preauth] Jan 11 01:08:45 host unix_chkpwd[11331]: password check failed for user (root) Jan 11 01:08:45 host sshd[11328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.76.28 user=root Jan 11 01:08:45 host sshd[11328]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:08:47 host sshd[11328]: Failed password for invalid user root from 101.32.76.28 port 41292 ssh2 Jan 11 01:08:47 host sshd[11328]: Received disconnect from 101.32.76.28 port 41292:11: Bye Bye [preauth] Jan 11 01:08:47 host sshd[11328]: Disconnected from 101.32.76.28 port 41292 [preauth] Jan 11 01:09:03 host sshd[11405]: User root from 178.128.122.222 not allowed because not listed in AllowUsers Jan 11 01:09:03 host sshd[11405]: input_userauth_request: invalid user root [preauth] Jan 11 01:09:04 host unix_chkpwd[11408]: password check failed for user (root) Jan 11 01:09:04 host sshd[11405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.122.222 user=root Jan 11 01:09:04 host sshd[11405]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:09:05 host sshd[11405]: Failed password for invalid user root from 178.128.122.222 port 35244 ssh2 Jan 11 01:09:05 host sshd[11405]: Received disconnect from 178.128.122.222 port 35244:11: Bye Bye [preauth] Jan 11 01:09:05 host sshd[11405]: Disconnected from 178.128.122.222 port 35244 [preauth] Jan 11 01:09:48 host sshd[11499]: User root from 143.255.141.251 not allowed because not listed in AllowUsers Jan 11 01:09:48 host sshd[11499]: input_userauth_request: invalid user root [preauth] Jan 11 01:09:48 host unix_chkpwd[11514]: password check failed for user (root) Jan 11 01:09:48 host sshd[11499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.141.251 user=root Jan 11 01:09:48 host sshd[11499]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:09:51 host sshd[11499]: Failed password for invalid user root from 143.255.141.251 port 53286 ssh2 Jan 11 01:09:53 host sshd[11499]: Received disconnect from 143.255.141.251 port 53286:11: Bye Bye [preauth] Jan 11 01:09:53 host sshd[11499]: Disconnected from 143.255.141.251 port 53286 [preauth] Jan 11 01:15:52 host sshd[12360]: Bad protocol version identification '' from 111.200.27.217 port 51870 Jan 11 01:15:54 host sshd[12363]: User root from 111.200.27.217 not allowed because not listed in AllowUsers Jan 11 01:15:54 host sshd[12363]: input_userauth_request: invalid user root [preauth] Jan 11 01:15:54 host unix_chkpwd[12370]: password check failed for user (root) Jan 11 01:15:54 host sshd[12363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.200.27.217 user=root Jan 11 01:15:54 host sshd[12363]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:15:56 host sshd[12363]: Failed password for invalid user root from 111.200.27.217 port 53914 ssh2 Jan 11 01:15:56 host sshd[12363]: Connection closed by 111.200.27.217 port 53914 [preauth] Jan 11 01:17:55 host sshd[12643]: Invalid user from 64.62.197.160 port 40089 Jan 11 01:17:55 host sshd[12643]: input_userauth_request: invalid user [preauth] Jan 11 01:17:58 host sshd[12643]: Connection closed by 64.62.197.160 port 40089 [preauth] Jan 11 01:20:32 host sshd[13050]: User root from 187.63.96.120 not allowed because not listed in AllowUsers Jan 11 01:20:32 host sshd[13050]: input_userauth_request: invalid user root [preauth] Jan 11 01:20:32 host unix_chkpwd[13055]: password check failed for user (root) Jan 11 01:20:32 host sshd[13050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.63.96.120 user=root Jan 11 01:20:32 host sshd[13050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 01:20:34 host sshd[13050]: Failed password for invalid user root from 187.63.96.120 port 43282 ssh2 Jan 11 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=straightcurve user-17=wwwletsstalkfood user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=wwwkaretakers user-24=cochintaxi user-25=keralaholi user-26=wwwresourcehunte user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 01:21:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4y49IHTW31zPcnC5.~ Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4y49IHTW31zPcnC5.~' Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4y49IHTW31zPcnC5.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 01:21:58 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 01:21:58 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 11 01:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 01:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 11 01:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 01:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 11 01:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 01:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 01:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 11 01:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 01:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 01:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 11 01:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 01:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 01:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 11 01:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 01:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 01:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 11 01:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 01:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 01:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 11 01:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 01:22:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 01:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 11 01:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 01:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 01:29:10 host sshd[14450]: Invalid user cg from 194.110.203.109 port 60444 Jan 11 01:29:10 host sshd[14450]: input_userauth_request: invalid user cg [preauth] Jan 11 01:29:10 host sshd[14450]: pam_unix(sshd:auth): check pass; user unknown Jan 11 01:29:10 host sshd[14450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 01:29:12 host sshd[14450]: Failed password for invalid user cg from 194.110.203.109 port 60444 ssh2 Jan 11 01:29:15 host sshd[14450]: pam_unix(sshd:auth): check pass; user unknown Jan 11 01:29:17 host sshd[14450]: Failed password for invalid user cg from 194.110.203.109 port 60444 ssh2 Jan 11 01:29:20 host sshd[14450]: pam_unix(sshd:auth): check pass; user unknown Jan 11 01:29:22 host sshd[14450]: Failed password for invalid user cg from 194.110.203.109 port 60444 ssh2 Jan 11 01:29:25 host sshd[14450]: Connection closed by 194.110.203.109 port 60444 [preauth] Jan 11 01:29:25 host sshd[14450]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 01:30:39 host sshd[14772]: Did not receive identification string from 202.65.154.98 port 51718 Jan 11 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwrmswll user-2=wwwresourcehunte user-3=keralaholi user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=wwwnexidigital user-13=mrsclean user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=wwwletsstalkfood user-19=straightcurve user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=wwwtestugo user-25=shalinijames user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 02:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9nhFxNyzzdvVKbmO.~ Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9nhFxNyzzdvVKbmO.~' Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9nhFxNyzzdvVKbmO.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 02:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 11 02:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 02:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 11 02:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 11 02:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 11 02:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 11 02:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 11 02:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:22:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 11 02:22:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 11 02:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 11 02:22:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:29:33 host sshd[23622]: Did not receive identification string from 120.48.120.83 port 39460 Jan 11 02:29:34 host sshd[23624]: Invalid user oracle from 120.48.120.83 port 42184 Jan 11 02:29:34 host sshd[23624]: input_userauth_request: invalid user oracle [preauth] Jan 11 02:29:34 host sshd[23629]: Invalid user zjw from 120.48.120.83 port 42196 Jan 11 02:29:34 host sshd[23630]: Invalid user www from 120.48.120.83 port 42206 Jan 11 02:29:34 host sshd[23629]: input_userauth_request: invalid user zjw [preauth] Jan 11 02:29:34 host sshd[23630]: input_userauth_request: invalid user www [preauth] Jan 11 02:29:34 host sshd[23640]: Invalid user test from 120.48.120.83 port 42160 Jan 11 02:29:34 host sshd[23640]: input_userauth_request: invalid user test [preauth] Jan 11 02:29:34 host sshd[23642]: Invalid user admin from 120.48.120.83 port 42204 Jan 11 02:29:34 host sshd[23642]: input_userauth_request: invalid user admin [preauth] Jan 11 02:29:34 host sshd[23644]: Invalid user esuser from 120.48.120.83 port 42226 Jan 11 02:29:34 host sshd[23644]: input_userauth_request: invalid user esuser [preauth] Jan 11 02:29:35 host sshd[23645]: Invalid user user from 120.48.120.83 port 42192 Jan 11 02:29:35 host sshd[23645]: input_userauth_request: invalid user user [preauth] Jan 11 02:29:35 host sshd[23643]: Invalid user admin from 120.48.120.83 port 42218 Jan 11 02:29:35 host sshd[23646]: Invalid user ftpuser from 120.48.120.83 port 42182 Jan 11 02:29:35 host sshd[23643]: input_userauth_request: invalid user admin [preauth] Jan 11 02:29:35 host sshd[23646]: input_userauth_request: invalid user ftpuser [preauth] Jan 11 02:29:35 host sshd[23656]: Invalid user posiflex from 120.48.120.83 port 42166 Jan 11 02:29:35 host sshd[23652]: Invalid user user from 120.48.120.83 port 42198 Jan 11 02:29:35 host sshd[23656]: input_userauth_request: invalid user posiflex [preauth] Jan 11 02:29:35 host sshd[23652]: input_userauth_request: invalid user user [preauth] Jan 11 02:29:35 host sshd[23658]: Invalid user ftpuser from 120.48.120.83 port 42170 Jan 11 02:29:35 host sshd[23658]: input_userauth_request: invalid user ftpuser [preauth] Jan 11 02:29:35 host sshd[23665]: Invalid user user from 120.48.120.83 port 42164 Jan 11 02:29:35 host sshd[23665]: input_userauth_request: invalid user user [preauth] Jan 11 02:29:35 host sshd[23624]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23627]: Invalid user steam from 120.48.120.83 port 42158 Jan 11 02:29:35 host sshd[23627]: input_userauth_request: invalid user steam [preauth] Jan 11 02:29:35 host sshd[23629]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23630]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23636]: Invalid user user from 120.48.120.83 port 42155 Jan 11 02:29:35 host sshd[23636]: input_userauth_request: invalid user user [preauth] Jan 11 02:29:35 host sshd[23642]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23640]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23645]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23646]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23643]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23656]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23655]: Invalid user guest from 120.48.120.83 port 42216 Jan 11 02:29:35 host sshd[23655]: input_userauth_request: invalid user guest [preauth] Jan 11 02:29:35 host sshd[23652]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23658]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23651]: Invalid user testuser from 120.48.120.83 port 42228 Jan 11 02:29:35 host sshd[23651]: input_userauth_request: invalid user testuser [preauth] Jan 11 02:29:35 host sshd[23665]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23625]: Invalid user ec2-user from 120.48.120.83 port 42162 Jan 11 02:29:35 host sshd[23625]: input_userauth_request: invalid user ec2-user [preauth] Jan 11 02:29:35 host sshd[23627]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23636]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23641]: User centos from 120.48.120.83 not allowed because not listed in AllowUsers Jan 11 02:29:35 host sshd[23641]: input_userauth_request: invalid user centos [preauth] Jan 11 02:29:35 host sshd[23655]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23651]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:35 host sshd[23651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:35 host sshd[23666]: Invalid user git from 120.48.120.83 port 42154 Jan 11 02:29:35 host sshd[23666]: input_userauth_request: invalid user git [preauth] Jan 11 02:29:36 host sshd[23673]: Invalid user postgres from 120.48.120.83 port 42178 Jan 11 02:29:36 host sshd[23673]: input_userauth_request: invalid user postgres [preauth] Jan 11 02:29:36 host sshd[23625]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:36 host sshd[23625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:36 host sshd[23638]: Invalid user postgres from 120.48.120.83 port 42180 Jan 11 02:29:36 host sshd[23638]: input_userauth_request: invalid user postgres [preauth] Jan 11 02:29:36 host unix_chkpwd[23683]: password check failed for user (centos) Jan 11 02:29:36 host sshd[23641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 user=centos Jan 11 02:29:36 host sshd[23666]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:36 host sshd[23666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:36 host sshd[23673]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:36 host sshd[23673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:36 host sshd[23638]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:29:36 host sshd[23638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 11 02:29:37 host sshd[23624]: Failed password for invalid user oracle from 120.48.120.83 port 42184 ssh2 Jan 11 02:29:37 host sshd[23630]: Failed password for invalid user www from 120.48.120.83 port 42206 ssh2 Jan 11 02:29:37 host sshd[23629]: Failed password for invalid user zjw from 120.48.120.83 port 42196 ssh2 Jan 11 02:29:37 host sshd[23642]: Failed password for invalid user admin from 120.48.120.83 port 42204 ssh2 Jan 11 02:29:37 host sshd[23640]: Failed password for invalid user test from 120.48.120.83 port 42160 ssh2 Jan 11 02:29:37 host sshd[23645]: Failed password for invalid user user from 120.48.120.83 port 42192 ssh2 Jan 11 02:29:37 host sshd[23646]: Failed password for invalid user ftpuser from 120.48.120.83 port 42182 ssh2 Jan 11 02:29:37 host sshd[23643]: Failed password for invalid user admin from 120.48.120.83 port 42218 ssh2 Jan 11 02:29:37 host sshd[23656]: Failed password for invalid user posiflex from 120.48.120.83 port 42166 ssh2 Jan 11 02:29:37 host sshd[23652]: Failed password for invalid user user from 120.48.120.83 port 42198 ssh2 Jan 11 02:29:37 host sshd[23658]: Failed password for invalid user ftpuser from 120.48.120.83 port 42170 ssh2 Jan 11 02:29:37 host sshd[23665]: Failed password for invalid user user from 120.48.120.83 port 42164 ssh2 Jan 11 02:29:37 host sshd[23627]: Failed password for invalid user steam from 120.48.120.83 port 42158 ssh2 Jan 11 02:29:37 host sshd[23636]: Failed password for invalid user user from 120.48.120.83 port 42155 ssh2 Jan 11 02:29:37 host sshd[23655]: Failed password for invalid user guest from 120.48.120.83 port 42216 ssh2 Jan 11 02:29:37 host sshd[23651]: Failed password for invalid user testuser from 120.48.120.83 port 42228 ssh2 Jan 11 02:29:38 host sshd[23625]: Failed password for invalid user ec2-user from 120.48.120.83 port 42162 ssh2 Jan 11 02:29:38 host sshd[23641]: Failed password for invalid user centos from 120.48.120.83 port 42222 ssh2 Jan 11 02:29:38 host sshd[23666]: Failed password for invalid user git from 120.48.120.83 port 42154 ssh2 Jan 11 02:29:39 host sshd[23673]: Failed password for invalid user postgres from 120.48.120.83 port 42178 ssh2 Jan 11 02:29:39 host sshd[23638]: Failed password for invalid user postgres from 120.48.120.83 port 42180 ssh2 Jan 11 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=palco123 user-4=gifterman user-5=phmetals user-6=kottayamcalldriv user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=wwwkapin user-16=woodpeck user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=keralaholi user-21=wwwresourcehunte user-22=wwwrmswll user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 02:29:55 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance info --format=json --check-updates=true Jan 11 02:29:55 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 02:30:00 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 11 02:30:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 02:30:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 02:30:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 11 02:30:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 02:30:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:30:04 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 02:30:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 11 02:30:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 11 02:30:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 11 02:30:06 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 02:30:06 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 02:30:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 11 02:30:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance info --format=json --check-updates=true Jan 11 02:30:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:13 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 11 02:30:13 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:15 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 11 02:30:15 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:20 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:30:20 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:20 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 11 02:30:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 11 02:30:21 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:21 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 11 02:30:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 11 02:30:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 11 02:30:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 11 02:30:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:30:22 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:23 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 11 02:30:23 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:30:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 11 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:36 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Jan 11 02:30:36 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:36 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:30:37 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/.maintenance Jan 11 02:30:37 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color db-prefix get Jan 11 02:30:37 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:37 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 11 02:30:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:30:38 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:38 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 11 02:30:38 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:39 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 11 02:30:39 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:39 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 11 02:30:39 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:40 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 11 02:30:40 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:40 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color admin-username is-secure Jan 11 02:30:40 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:41 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:30:41 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:41 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/public_html/wp-config.php Jan 11 02:30:41 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:41 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/stat -c %a /home/wwwletsstalkfood/public_html/wp-config.php Jan 11 02:30:41 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:41 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color pingbacks is_disabled Jan 11 02:30:41 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:42 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:30:42 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:42 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color security-keys are_keys_correct Jan 11 02:30:42 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:30:43 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 11 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color instance info --format=json --check-updates=true Jan 11 02:30:43 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 02:30:43 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 11 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/backup/wp-includes/version.php Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/backup/wp-includes/version.php Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color instance info --format=json --check-updates=true Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/public_html/blog/wp-includes/version.php Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/public_html/blog/wp-includes/version.php Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:30:44 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 02:30:45 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 11 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance info --format=json --check-updates=true Jan 11 02:30:45 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Jan 11 02:31:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Jan 11 02:31:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:31:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:03 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 11 02:31:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:31:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 11 02:31:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 11 02:31:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:31:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:31:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 11 02:31:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:31:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:31:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:31:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_plugins --format=json Jan 11 02:31:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:31:07 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:11 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option get auto_update_themes --format=json Jan 11 02:31:12 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:12 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Jan 11 02:31:12 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:12 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:31:12 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:12 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/.maintenance Jan 11 02:31:12 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:13 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color db-prefix get Jan 11 02:31:13 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:13 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 11 02:31:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:31:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:31:13 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:14 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 11 02:31:14 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:14 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 11 02:31:14 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:15 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 11 02:31:15 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:15 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 11 02:31:15 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color admin-username is-secure Jan 11 02:31:16 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:31:16 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/public_html/wp-config.php Jan 11 02:31:16 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:16 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/stat -c %a /home/shalinijames/public_html/wp-config.php Jan 11 02:31:17 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:17 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color pingbacks is_disabled Jan 11 02:31:17 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:17 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:31:17 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:17 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color security-keys are_keys_correct Jan 11 02:31:17 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:31:18 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 11 02:31:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:31:18 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:31:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance info --format=json --check-updates=true Jan 11 02:31:18 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:34 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Jan 11 02:31:34 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Jan 11 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 11 02:31:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:31:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color instance login-url --skip-plugins=false --format=json Jan 11 02:31:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 11 02:31:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:31:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 11 02:31:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:31:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:31:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_plugins --format=json Jan 11 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:31:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option get auto_update_themes --format=json Jan 11 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Jan 11 02:31:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/.maintenance Jan 11 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color db-prefix get Jan 11 02:31:42 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:42 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 11 02:31:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:31:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:31:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 11 02:31:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 11 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 11 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 11 02:31:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color admin-username is-secure Jan 11 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:31:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt1/wp-config.php Jan 11 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt1/wp-config.php Jan 11 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color pingbacks is_disabled Jan 11 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color security-keys are_keys_correct Jan 11 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance info --format=json --check-updates=true Jan 11 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Jan 11 02:31:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Jan 11 02:31:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:31:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:53 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color instance login-url --skip-plugins=false --format=json Jan 11 02:31:53 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:54 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:31:54 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_plugins --format=json Jan 11 02:31:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:31:55 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:31:55 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:03 host sshd[24960]: Did not receive identification string from 149.129.220.222 port 61000 Jan 11 02:32:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option get auto_update_themes --format=json Jan 11 02:32:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Jan 11 02:32:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:32:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/.maintenance Jan 11 02:32:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color db-prefix get Jan 11 02:32:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:10 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 11 02:32:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:32:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:32:10 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 11 02:32:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 11 02:32:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 11 02:32:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 11 02:32:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color admin-username is-secure Jan 11 02:32:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:32:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/tt/wp-config.php Jan 11 02:32:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/tt/wp-config.php Jan 11 02:32:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:13 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color pingbacks is_disabled Jan 11 02:32:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:32:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color security-keys are_keys_correct Jan 11 02:32:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance info --format=json --check-updates=true Jan 11 02:32:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:37 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Jan 11 02:32:37 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Jan 11 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color instance login-url --skip-plugins=false --format=json Jan 11 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:40 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:32:40 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_plugins --format=json Jan 11 02:32:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:41 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:32:41 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option get auto_update_themes --format=json Jan 11 02:32:45 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:45 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 11 02:32:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:32:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/.maintenance Jan 11 02:32:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color db-prefix get Jan 11 02:32:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 11 02:32:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:32:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:32:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:32:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 11 02:32:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 11 02:32:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 11 02:32:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:48 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 11 02:32:48 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color admin-username is-secure Jan 11 02:32:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:49 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:32:49 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 11 02:32:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/stat -c %a /home/wwwtestugo/public_html/HYPE/wp-config.php Jan 11 02:32:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color pingbacks is_disabled Jan 11 02:32:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:32:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color security-keys are_keys_correct Jan 11 02:32:51 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:32:51 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 11 02:32:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:32:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color instance info --format=json --check-updates=true Jan 11 02:32:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:32:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 11 02:32:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/public_html/boniface/blog/wp-includes/version.php Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance info --format=json --check-updates=true Jan 11 02:32:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Jan 11 02:33:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Jan 11 02:33:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:33:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color instance login-url --skip-plugins=false --format=json Jan 11 02:33:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:33:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_plugins --format=json Jan 11 02:33:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:33:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option get auto_update_themes --format=json Jan 11 02:33:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 11 02:33:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:33:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/.maintenance Jan 11 02:33:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color db-prefix get Jan 11 02:33:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 11 02:33:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:33:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:33:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:33:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 11 02:33:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 11 02:33:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 11 02:33:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 11 02:33:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color admin-username is-secure Jan 11 02:33:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 11 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/UGOCRM/ugo_blg/wp-config.php Jan 11 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color pingbacks is_disabled Jan 11 02:33:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:33:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color security-keys are_keys_correct Jan 11 02:33:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:13 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance info --format=json --check-updates=true Jan 11 02:33:13 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Jan 11 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Jan 11 02:33:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:33:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color instance login-url --skip-plugins=false --format=json Jan 11 02:33:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:33:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_plugins --format=json Jan 11 02:33:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:33:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option get auto_update_themes --format=json Jan 11 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Jan 11 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:33:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/.maintenance Jan 11 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color db-prefix get Jan 11 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 11 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:33:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 11 02:33:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 11 02:33:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 11 02:33:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 11 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:25 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color admin-username is-secure Jan 11 02:33:25 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/public_html/old/site/wp-config.php Jan 11 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/stat -c %a /home/ugotscom/public_html/old/site/wp-config.php Jan 11 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color pingbacks is_disabled Jan 11 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:26 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:33:26 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color security-keys are_keys_correct Jan 11 02:33:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:33:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 11 02:33:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:33:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color instance info --format=json --check-updates=true Jan 11 02:33:27 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 11 02:33:27 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 11 02:33:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 11 02:33:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:33:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 11 02:33:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:33:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/public_html/wp/wp-includes/version.php Jan 11 02:33:28 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 11 02:33:28 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 11 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:33:28 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 11 02:33:28 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 11 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 11 02:33:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:33:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 11 02:33:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:33:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance info --format=json --check-updates=true Jan 11 02:33:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:35 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 11 02:33:35 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:36 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 11 02:33:36 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:42 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:33:42 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:42 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 11 02:33:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:33:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:33:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 11 02:33:42 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:43 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 11 02:33:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:33:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 11 02:33:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:33:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:33:43 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:44 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color plugin auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 11 02:33:44 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:45 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:33:45 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:50 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color theme auto-updates status --all --enabled-only --field=name --skip-plugins=false --skip-themes=false Jan 11 02:33:50 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:56 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Jan 11 02:33:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:56 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:33:56 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:57 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/.maintenance Jan 11 02:33:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:57 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color db-prefix get Jan 11 02:33:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:57 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 11 02:33:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:33:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:33:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:33:57 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:58 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option get auto_update_core_major Jan 11 02:33:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:58 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 11 02:33:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:33:59 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:33:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 11 02:33:59 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:34:00 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color admin-username is-secure Jan 11 02:34:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:34:00 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:34:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:34:01 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/public_html/wp-config.php Jan 11 02:34:01 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:34:01 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/stat -c %a /home/palco123/public_html/wp-config.php Jan 11 02:34:01 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:34:01 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color pingbacks is_disabled Jan 11 02:34:01 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:34:01 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:34:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:34:01 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:34:02 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color security-keys are_keys_correct Jan 11 02:34:02 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:34:02 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:34:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 11 02:34:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance info --format=json --check-updates=true Jan 11 02:34:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Jan 11 02:34:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Jan 11 02:34:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 11 02:34:09 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:09 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 11 02:34:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color instance login-url --skip-plugins=false --format=json Jan 11 02:34:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 11 02:34:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 11 02:34:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color plugin list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:34:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_plugins --format=json Jan 11 02:34:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color theme list --fields=name,status,version,title,description,update_version --format=json --quiet --skip-plugins=false --skip-themes=false Jan 11 02:34:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option get auto_update_themes --format=json Jan 11 02:34:16 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:16 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Jan 11 02:34:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:34:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/.maintenance Jan 11 02:34:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color db-prefix get Jan 11 02:34:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:17 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 11 02:34:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:34:17 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_version_check '+2 day' Jan 11 02:34:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:18 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color wpt-cron event reschedule wp_maybe_auto_update '+2 day' Jan 11 02:34:18 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 11 02:34:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 11 02:34:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:19 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color admin-username is-secure Jan 11 02:34:19 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:34:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/public_html/wp-config.php Jan 11 02:34:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/stat -c %a /home/wwwresourcehunte/public_html/wp-config.php Jan 11 02:34:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:20 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color pingbacks is_disabled Jan 11 02:34:20 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color config-settings get --params=DB_CHARSET,DB_NAME,DB_USER,DB_PASSWORD,DB_HOST,DOMAIN_CURRENT_SITE,PATH_CURRENT_SITE,MULTISITE,SUBDOMAIN_INSTALL,WP_AUTO_UPDATE_CORE,WPCACHEHOME,WP_DEBUG,WP_DEBUG_LOG,WP_DEBUG_DISPLAY,SCRIPT_DEBUG,SAVEQUERIES,WP_HOME,WP_SITEURL,CONCATENATE_SCRIPTS,DISALLOW_FILE_EDIT,WP_CACHE_KEY_SALT,DISABLE_WP_CRON --format=json Jan 11 02:34:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color security-keys are_keys_correct Jan 11 02:34:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:21 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "Anti-Malware Security and Brute-Force Firewall" on Shalini James Blog (http://www.shalinijames.com). Installed version: 4.18.71. Available version: 4.21.89.<br/><br/>2. Plugin "Yoast SEO" on Panlys (https://www.panlys.com). Installed version: 16.3. Available version: 19.14.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in Jan 11 02:34:21 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): Jan 11 02:34:21 host sudo: wp-toolkit : (command continued) require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database Jan 11 02:34:21 host sudo: wp-toolkit : (command continued) connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: /bin/sh: line 0: cd: /home/woodpeck/public_html/wp: No such file or directory#012<br/><br/>' --output=json Jan 11 02:34:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color cli cache clear Jan 11 02:34:21 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 02:34:22 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color cli cache clear Jan 11 02:34:22 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:34:22 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/backup --no-color cli cache clear Jan 11 02:34:22 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 02:34:22 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/mrsclean/public_html/blog --no-color cli cache clear Jan 11 02:34:22 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 02:34:22 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color cli cache clear Jan 11 02:34:22 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:34:22 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color cli cache clear Jan 11 02:34:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:34:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color cli cache clear Jan 11 02:34:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:34:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color cli cache clear Jan 11 02:34:23 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:34:23 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/boniface/blog --no-color cli cache clear Jan 11 02:34:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:34:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color cli cache clear Jan 11 02:34:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:34:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color cli cache clear Jan 11 02:34:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:34:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:34:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/woodpeck/public_html/wp --no-color cli cache clear Jan 11 02:34:24 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 11 02:34:24 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 11 02:34:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color cli cache clear Jan 11 02:34:24 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:34:24 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:34:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color cli cache clear Jan 11 02:34:24 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:24 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 11 02:34:24 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 02:34:25 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 02:34:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 11 02:34:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 02:34:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 02:34:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 11 02:34:25 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 02:34:26 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 02:34:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 11 02:34:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:34:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:34:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 11 02:34:26 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:34:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:34:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 11 02:34:27 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 02:34:27 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 02:34:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 11 02:34:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:34:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:34:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 11 02:34:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 02:34:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 02:34:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/palco123/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 11 02:34:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color option list --search=jetpack_affiliate_code --field=option_value --format=json --quiet Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 02:53:38 host sshd[29320]: Invalid user carlos from 107.189.30.59 port 56484 Jan 11 02:53:38 host sshd[29320]: input_userauth_request: invalid user carlos [preauth] Jan 11 02:53:38 host sshd[29320]: pam_unix(sshd:auth): check pass; user unknown Jan 11 02:53:38 host sshd[29320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 11 02:53:40 host sshd[29320]: Failed password for invalid user carlos from 107.189.30.59 port 56484 ssh2 Jan 11 02:53:41 host sshd[29320]: Connection closed by 107.189.30.59 port 56484 [preauth] Jan 11 02:59:38 host sshd[30132]: Connection closed by 198.199.118.95 port 32978 [preauth] Jan 11 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=wwwkapin user-17=woodpeck user-18=remysagr user-19=disposeat user-20=wwwkmaorg user-21=wwwnexidigital user-22=mrsclean user-23=kottayamcalldriv user-24=phmetals user-25=gifterman user-26=palco123 user-27=straightcurve user-28=wwwletsstalkfood user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 03:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4Lbqk7NjwttXLQTv.~ Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4Lbqk7NjwttXLQTv.~' Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4Lbqk7NjwttXLQTv.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 03:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 03:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 11 03:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 03:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 11 03:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 03:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 11 03:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 03:22:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 03:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 11 03:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 03:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 11 03:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 03:22:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 03:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 11 03:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 03:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 03:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 11 03:22:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 03:22:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 03:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 11 03:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 03:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 03:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 11 03:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 03:22:14 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 03:27:49 host sshd[2944]: Invalid user ch from 194.110.203.109 port 52406 Jan 11 03:27:49 host sshd[2944]: input_userauth_request: invalid user ch [preauth] Jan 11 03:27:49 host sshd[2944]: pam_unix(sshd:auth): check pass; user unknown Jan 11 03:27:49 host sshd[2944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 03:27:51 host sshd[2944]: Failed password for invalid user ch from 194.110.203.109 port 52406 ssh2 Jan 11 03:27:55 host sshd[2944]: pam_unix(sshd:auth): check pass; user unknown Jan 11 03:27:57 host sshd[2944]: Failed password for invalid user ch from 194.110.203.109 port 52406 ssh2 Jan 11 03:28:00 host sshd[2944]: pam_unix(sshd:auth): check pass; user unknown Jan 11 03:28:02 host sshd[2944]: Failed password for invalid user ch from 194.110.203.109 port 52406 ssh2 Jan 11 03:28:05 host sshd[2944]: Connection closed by 194.110.203.109 port 52406 [preauth] Jan 11 03:28:05 host sshd[2944]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 03:34:48 host sshd[4035]: User root from 165.227.193.194 not allowed because not listed in AllowUsers Jan 11 03:34:48 host sshd[4035]: input_userauth_request: invalid user root [preauth] Jan 11 03:34:48 host unix_chkpwd[4039]: password check failed for user (root) Jan 11 03:34:48 host sshd[4035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.193.194 user=root Jan 11 03:34:48 host sshd[4035]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 03:34:50 host sshd[4035]: Failed password for invalid user root from 165.227.193.194 port 54372 ssh2 Jan 11 03:34:50 host sshd[4035]: Received disconnect from 165.227.193.194 port 54372:11: Bye Bye [preauth] Jan 11 03:34:50 host sshd[4035]: Disconnected from 165.227.193.194 port 54372 [preauth] Jan 11 03:38:14 host sshd[4587]: User root from 165.227.193.194 not allowed because not listed in AllowUsers Jan 11 03:38:14 host sshd[4587]: input_userauth_request: invalid user root [preauth] Jan 11 03:38:14 host unix_chkpwd[4591]: password check failed for user (root) Jan 11 03:38:14 host sshd[4587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.193.194 user=root Jan 11 03:38:14 host sshd[4587]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 03:38:17 host sshd[4587]: Failed password for invalid user root from 165.227.193.194 port 51524 ssh2 Jan 11 03:38:17 host sshd[4587]: Received disconnect from 165.227.193.194 port 51524:11: Bye Bye [preauth] Jan 11 03:38:17 host sshd[4587]: Disconnected from 165.227.193.194 port 51524 [preauth] Jan 11 03:38:36 host sshd[4688]: User root from 101.36.111.137 not allowed because not listed in AllowUsers Jan 11 03:38:36 host sshd[4688]: input_userauth_request: invalid user root [preauth] Jan 11 03:38:36 host unix_chkpwd[4691]: password check failed for user (root) Jan 11 03:38:36 host sshd[4688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.111.137 user=root Jan 11 03:38:36 host sshd[4688]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 03:38:39 host sshd[4688]: Failed password for invalid user root from 101.36.111.137 port 44034 ssh2 Jan 11 03:38:39 host sshd[4688]: Received disconnect from 101.36.111.137 port 44034:11: Bye Bye [preauth] Jan 11 03:38:39 host sshd[4688]: Disconnected from 101.36.111.137 port 44034 [preauth] Jan 11 03:40:37 host sshd[4988]: User root from 101.36.111.137 not allowed because not listed in AllowUsers Jan 11 03:40:37 host sshd[4988]: input_userauth_request: invalid user root [preauth] Jan 11 03:40:37 host unix_chkpwd[4991]: password check failed for user (root) Jan 11 03:40:37 host sshd[4988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.111.137 user=root Jan 11 03:40:37 host sshd[4988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 03:40:39 host sshd[4988]: Failed password for invalid user root from 101.36.111.137 port 13144 ssh2 Jan 11 03:40:39 host sshd[4988]: Received disconnect from 101.36.111.137 port 13144:11: Bye Bye [preauth] Jan 11 03:40:39 host sshd[4988]: Disconnected from 101.36.111.137 port 13144 [preauth] Jan 11 03:53:54 host sshd[7237]: User root from 161.35.0.70 not allowed because not listed in AllowUsers Jan 11 03:53:54 host sshd[7237]: input_userauth_request: invalid user root [preauth] Jan 11 03:53:55 host unix_chkpwd[7240]: password check failed for user (root) Jan 11 03:53:55 host sshd[7237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.0.70 user=root Jan 11 03:53:55 host sshd[7237]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 03:53:57 host sshd[7237]: Failed password for invalid user root from 161.35.0.70 port 38612 ssh2 Jan 11 03:53:57 host sshd[7237]: Received disconnect from 161.35.0.70 port 38612:11: Bye Bye [preauth] Jan 11 03:53:57 host sshd[7237]: Disconnected from 161.35.0.70 port 38612 [preauth] Jan 11 03:53:58 host sshd[7245]: User root from 207.178.145.171 not allowed because not listed in AllowUsers Jan 11 03:53:58 host sshd[7245]: input_userauth_request: invalid user root [preauth] Jan 11 03:53:58 host unix_chkpwd[7254]: password check failed for user (root) Jan 11 03:53:58 host sshd[7245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.178.145.171 user=root Jan 11 03:53:58 host sshd[7245]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 03:54:01 host sshd[7245]: Failed password for invalid user root from 207.178.145.171 port 24951 ssh2 Jan 11 03:54:01 host sshd[7245]: Received disconnect from 207.178.145.171 port 24951:11: Bye Bye [preauth] Jan 11 03:54:01 host sshd[7245]: Disconnected from 207.178.145.171 port 24951 [preauth] Jan 11 03:55:26 host sshd[7410]: User root from 143.198.53.101 not allowed because not listed in AllowUsers Jan 11 03:55:26 host sshd[7410]: input_userauth_request: invalid user root [preauth] Jan 11 03:55:26 host unix_chkpwd[7414]: password check failed for user (root) Jan 11 03:55:26 host sshd[7410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.53.101 user=root Jan 11 03:55:26 host sshd[7410]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 03:55:28 host sshd[7410]: Failed password for invalid user root from 143.198.53.101 port 40662 ssh2 Jan 11 03:55:28 host sshd[7410]: Received disconnect from 143.198.53.101 port 40662:11: Bye Bye [preauth] Jan 11 03:55:28 host sshd[7410]: Disconnected from 143.198.53.101 port 40662 [preauth] Jan 11 03:57:00 host sshd[7588]: User root from 34.151.215.28 not allowed because not listed in AllowUsers Jan 11 03:57:00 host sshd[7588]: input_userauth_request: invalid user root [preauth] Jan 11 03:57:00 host unix_chkpwd[7592]: password check failed for user (root) Jan 11 03:57:00 host sshd[7588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.151.215.28 user=root Jan 11 03:57:00 host sshd[7588]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 03:57:03 host sshd[7588]: Failed password for invalid user root from 34.151.215.28 port 56254 ssh2 Jan 11 03:57:03 host sshd[7588]: Received disconnect from 34.151.215.28 port 56254:11: Bye Bye [preauth] Jan 11 03:57:03 host sshd[7588]: Disconnected from 34.151.215.28 port 56254 [preauth] Jan 11 03:58:12 host sshd[7833]: User root from 178.62.2.24 not allowed because not listed in AllowUsers Jan 11 03:58:12 host sshd[7833]: input_userauth_request: invalid user root [preauth] Jan 11 03:58:12 host unix_chkpwd[7836]: password check failed for user (root) Jan 11 03:58:12 host sshd[7833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.2.24 user=root Jan 11 03:58:12 host sshd[7833]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 03:58:15 host sshd[7833]: Failed password for invalid user root from 178.62.2.24 port 40958 ssh2 Jan 11 03:58:15 host sshd[7833]: Received disconnect from 178.62.2.24 port 40958:11: Bye Bye [preauth] Jan 11 03:58:15 host sshd[7833]: Disconnected from 178.62.2.24 port 40958 [preauth] Jan 11 03:59:25 host sshd[7975]: User root from 161.35.0.70 not allowed because not listed in AllowUsers Jan 11 03:59:25 host sshd[7975]: input_userauth_request: invalid user root [preauth] Jan 11 03:59:25 host unix_chkpwd[7982]: password check failed for user (root) Jan 11 03:59:25 host sshd[7975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.0.70 user=root Jan 11 03:59:25 host sshd[7975]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 03:59:25 host sshd[7984]: User root from 64.227.140.231 not allowed because not listed in AllowUsers Jan 11 03:59:25 host sshd[7984]: input_userauth_request: invalid user root [preauth] Jan 11 03:59:25 host unix_chkpwd[7986]: password check failed for user (root) Jan 11 03:59:25 host sshd[7984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.140.231 user=root Jan 11 03:59:25 host sshd[7984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 03:59:27 host sshd[7975]: Failed password for invalid user root from 161.35.0.70 port 39342 ssh2 Jan 11 03:59:27 host sshd[7984]: Failed password for invalid user root from 64.227.140.231 port 55980 ssh2 Jan 11 03:59:27 host sshd[7984]: Received disconnect from 64.227.140.231 port 55980:11: Bye Bye [preauth] Jan 11 03:59:27 host sshd[7984]: Disconnected from 64.227.140.231 port 55980 [preauth] Jan 11 03:59:27 host sshd[7975]: Received disconnect from 161.35.0.70 port 39342:11: Bye Bye [preauth] Jan 11 03:59:27 host sshd[7975]: Disconnected from 161.35.0.70 port 39342 [preauth] Jan 11 04:00:12 host sshd[8179]: User root from 34.151.215.28 not allowed because not listed in AllowUsers Jan 11 04:00:12 host sshd[8179]: input_userauth_request: invalid user root [preauth] Jan 11 04:00:12 host unix_chkpwd[8182]: password check failed for user (root) Jan 11 04:00:12 host sshd[8179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.151.215.28 user=root Jan 11 04:00:12 host sshd[8179]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:00:15 host sshd[8179]: Failed password for invalid user root from 34.151.215.28 port 39726 ssh2 Jan 11 04:00:16 host sshd[8207]: User root from 27.1.253.142 not allowed because not listed in AllowUsers Jan 11 04:00:16 host sshd[8207]: input_userauth_request: invalid user root [preauth] Jan 11 04:00:16 host unix_chkpwd[8221]: password check failed for user (root) Jan 11 04:00:16 host sshd[8207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.1.253.142 user=root Jan 11 04:00:16 host sshd[8207]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:00:18 host sshd[8207]: Failed password for invalid user root from 27.1.253.142 port 53772 ssh2 Jan 11 04:00:18 host sshd[8207]: Received disconnect from 27.1.253.142 port 53772:11: Bye Bye [preauth] Jan 11 04:00:18 host sshd[8207]: Disconnected from 27.1.253.142 port 53772 [preauth] Jan 11 04:00:20 host sshd[8226]: User root from 143.198.53.101 not allowed because not listed in AllowUsers Jan 11 04:00:20 host sshd[8226]: input_userauth_request: invalid user root [preauth] Jan 11 04:00:20 host unix_chkpwd[8233]: password check failed for user (root) Jan 11 04:00:20 host sshd[8226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.53.101 user=root Jan 11 04:00:20 host sshd[8226]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:00:21 host sshd[8226]: Failed password for invalid user root from 143.198.53.101 port 60114 ssh2 Jan 11 04:00:22 host sshd[8226]: Received disconnect from 143.198.53.101 port 60114:11: Bye Bye [preauth] Jan 11 04:00:22 host sshd[8226]: Disconnected from 143.198.53.101 port 60114 [preauth] Jan 11 04:00:45 host sshd[8316]: User root from 178.62.2.24 not allowed because not listed in AllowUsers Jan 11 04:00:45 host sshd[8316]: input_userauth_request: invalid user root [preauth] Jan 11 04:00:45 host unix_chkpwd[8319]: password check failed for user (root) Jan 11 04:00:45 host sshd[8316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.2.24 user=root Jan 11 04:00:45 host sshd[8316]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:00:46 host sshd[8316]: Failed password for invalid user root from 178.62.2.24 port 45334 ssh2 Jan 11 04:00:46 host sshd[8316]: Received disconnect from 178.62.2.24 port 45334:11: Bye Bye [preauth] Jan 11 04:00:46 host sshd[8316]: Disconnected from 178.62.2.24 port 45334 [preauth] Jan 11 04:01:28 host sshd[8472]: User root from 64.227.140.231 not allowed because not listed in AllowUsers Jan 11 04:01:28 host sshd[8472]: input_userauth_request: invalid user root [preauth] Jan 11 04:01:28 host unix_chkpwd[8474]: password check failed for user (root) Jan 11 04:01:28 host sshd[8472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.140.231 user=root Jan 11 04:01:28 host sshd[8472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:01:30 host sshd[8472]: Failed password for invalid user root from 64.227.140.231 port 56116 ssh2 Jan 11 04:01:30 host sshd[8472]: Received disconnect from 64.227.140.231 port 56116:11: Bye Bye [preauth] Jan 11 04:01:30 host sshd[8472]: Disconnected from 64.227.140.231 port 56116 [preauth] Jan 11 04:04:31 host sshd[8925]: User root from 104.248.31.56 not allowed because not listed in AllowUsers Jan 11 04:04:31 host sshd[8925]: input_userauth_request: invalid user root [preauth] Jan 11 04:04:31 host unix_chkpwd[8928]: password check failed for user (root) Jan 11 04:04:31 host sshd[8925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.31.56 user=root Jan 11 04:04:31 host sshd[8925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:04:33 host sshd[8925]: Failed password for invalid user root from 104.248.31.56 port 60278 ssh2 Jan 11 04:04:34 host sshd[8925]: Received disconnect from 104.248.31.56 port 60278:11: Bye Bye [preauth] Jan 11 04:04:34 host sshd[8925]: Disconnected from 104.248.31.56 port 60278 [preauth] Jan 11 04:05:33 host sshd[9052]: User root from 27.1.253.142 not allowed because not listed in AllowUsers Jan 11 04:05:33 host sshd[9052]: input_userauth_request: invalid user root [preauth] Jan 11 04:05:33 host unix_chkpwd[9054]: password check failed for user (root) Jan 11 04:05:33 host sshd[9052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.1.253.142 user=root Jan 11 04:05:33 host sshd[9052]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:05:35 host sshd[9052]: Failed password for invalid user root from 27.1.253.142 port 53939 ssh2 Jan 11 04:05:35 host sshd[9052]: Received disconnect from 27.1.253.142 port 53939:11: Bye Bye [preauth] Jan 11 04:05:35 host sshd[9052]: Disconnected from 27.1.253.142 port 53939 [preauth] Jan 11 04:07:54 host sshd[9372]: User root from 43.225.157.56 not allowed because not listed in AllowUsers Jan 11 04:07:54 host sshd[9372]: input_userauth_request: invalid user root [preauth] Jan 11 04:07:54 host unix_chkpwd[9375]: password check failed for user (root) Jan 11 04:07:54 host sshd[9372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.157.56 user=root Jan 11 04:07:54 host sshd[9372]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:07:56 host sshd[9372]: Failed password for invalid user root from 43.225.157.56 port 42490 ssh2 Jan 11 04:07:56 host sshd[9372]: Received disconnect from 43.225.157.56 port 42490:11: Bye Bye [preauth] Jan 11 04:07:56 host sshd[9372]: Disconnected from 43.225.157.56 port 42490 [preauth] Jan 11 04:08:59 host sshd[9488]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 11 04:08:59 host sshd[9488]: input_userauth_request: invalid user root [preauth] Jan 11 04:08:59 host unix_chkpwd[9491]: password check failed for user (root) Jan 11 04:08:59 host sshd[9488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 11 04:08:59 host sshd[9488]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:09:01 host sshd[9488]: Failed password for invalid user root from 194.169.175.102 port 65519 ssh2 Jan 11 04:09:01 host sshd[9488]: Received disconnect from 194.169.175.102 port 65519:11: Client disconnecting normally [preauth] Jan 11 04:09:01 host sshd[9488]: Disconnected from 194.169.175.102 port 65519 [preauth] Jan 11 04:10:26 host sshd[9761]: User root from 43.225.157.56 not allowed because not listed in AllowUsers Jan 11 04:10:26 host sshd[9761]: input_userauth_request: invalid user root [preauth] Jan 11 04:10:26 host unix_chkpwd[9764]: password check failed for user (root) Jan 11 04:10:26 host sshd[9761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.157.56 user=root Jan 11 04:10:26 host sshd[9761]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:10:29 host sshd[9761]: Failed password for invalid user root from 43.225.157.56 port 40736 ssh2 Jan 11 04:10:29 host sshd[9761]: Received disconnect from 43.225.157.56 port 40736:11: Bye Bye [preauth] Jan 11 04:10:29 host sshd[9761]: Disconnected from 43.225.157.56 port 40736 [preauth] Jan 11 04:10:51 host sshd[9844]: User root from 104.248.31.56 not allowed because not listed in AllowUsers Jan 11 04:10:51 host sshd[9844]: input_userauth_request: invalid user root [preauth] Jan 11 04:10:51 host unix_chkpwd[9859]: password check failed for user (root) Jan 11 04:10:51 host sshd[9844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.31.56 user=root Jan 11 04:10:51 host sshd[9844]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:10:52 host sshd[9844]: Failed password for invalid user root from 104.248.31.56 port 56376 ssh2 Jan 11 04:10:53 host sshd[9844]: Received disconnect from 104.248.31.56 port 56376:11: Bye Bye [preauth] Jan 11 04:10:53 host sshd[9844]: Disconnected from 104.248.31.56 port 56376 [preauth] Jan 11 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=phmetals user-24=kottayamcalldriv user-25=palco123 user-26=gifterman user-27=straightcurve user-28=wwwletsstalkfood user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 04:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zUsH517HpMwhEq6K.~ Jan 11 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zUsH517HpMwhEq6K.~' Jan 11 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zUsH517HpMwhEq6K.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 04:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 04:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 11 04:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 04:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 11 04:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 04:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 11 04:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 04:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 04:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 11 04:22:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 04:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 04:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 11 04:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 04:22:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 04:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 11 04:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 04:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 04:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 11 04:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 04:22:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 04:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 11 04:22:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 04:22:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 04:22:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 11 04:22:14 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 04:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 04:44:09 host sshd[15655]: User root from 45.143.201.62 not allowed because not listed in AllowUsers Jan 11 04:44:09 host sshd[15655]: input_userauth_request: invalid user root [preauth] Jan 11 04:44:10 host unix_chkpwd[15658]: password check failed for user (root) Jan 11 04:44:10 host sshd[15655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.143.201.62 user=root Jan 11 04:44:10 host sshd[15655]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:44:11 host sshd[15655]: Failed password for invalid user root from 45.143.201.62 port 29638 ssh2 Jan 11 04:44:11 host unix_chkpwd[15661]: password check failed for user (root) Jan 11 04:44:11 host sshd[15655]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:44:14 host sshd[15655]: Failed password for invalid user root from 45.143.201.62 port 29638 ssh2 Jan 11 04:44:14 host unix_chkpwd[15664]: password check failed for user (root) Jan 11 04:44:14 host sshd[15655]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:44:15 host sshd[15655]: Failed password for invalid user root from 45.143.201.62 port 29638 ssh2 Jan 11 04:44:15 host unix_chkpwd[15667]: password check failed for user (root) Jan 11 04:44:15 host sshd[15655]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:44:16 host sshd[15655]: Failed password for invalid user root from 45.143.201.62 port 29638 ssh2 Jan 11 04:44:17 host unix_chkpwd[15688]: password check failed for user (root) Jan 11 04:44:17 host sshd[15655]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 04:44:19 host sshd[15655]: Failed password for invalid user root from 45.143.201.62 port 29638 ssh2 Jan 11 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=disposeat user-4=remysagr user-5=wwwkmaorg user-6=pmcresources user-7=vfmassets user-8=wwwtestugo user-9=shalinijames user-10=wwwletsstalkfood user-11=straightcurve user-12=bonifacegroup user-13=wwwevmhonda user-14=mrsclean user-15=wwwnexidigital user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 05:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && find -H /home/wwwevmhonda/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && find -H /home/wwwletsstalkfood/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/backup && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html/blog && find -H /home/mrsclean/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && find -H /home/shalinijames/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && find -H /home/wwwtestugo/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/boniface/blog && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && find -H /home/ugotscom/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html/wp && find -H /home/woodpeck/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && find -H /home/palco123/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:22:00 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && find -H /home/wwwresourcehunte/wordpress-backups -mindepth 1 -maxdepth 1 -printf '%f\0' Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 11 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 11 05:22:01 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-mjzxjSXTcTATr0Gj.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-mjzxjSXTcTATr0Gj.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-UWXuv3nTvRPTkAqB.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 11 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-UWXuv3nTvRPTkAqB.wp-toolkit-identifier Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 11 05:22:02 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 11 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 11 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 11 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KUwQzjofVfsm2Qyn.~ Jan 11 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KUwQzjofVfsm2Qyn.~' Jan 11 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KUwQzjofVfsm2Qyn.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 05:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 05:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 05:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 05:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 05:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwevmhonda/public_html --no-color core check-update --format=json Jan 11 05:22:08 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 11 05:22:09 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 11 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwletsstalkfood/public_html --no-color core check-update --format=json Jan 11 05:22:09 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 11 05:22:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 11 05:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/shalinijames/public_html --no-color core check-update --format=json Jan 11 05:22:11 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 11 05:22:13 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 11 05:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt1 && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt1 --no-color core check-update --format=json Jan 11 05:22:13 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 05:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 05:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/tt && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/tt --no-color core check-update --format=json Jan 11 05:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 05:22:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 05:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html/HYPE && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwtestugo/public_html/HYPE --no-color core check-update --format=json Jan 11 05:22:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 11 05:22:17 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 11 05:22:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/UGOCRM/ugo_blg && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --no-color core check-update --format=json Jan 11 05:22:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 05:22:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 05:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html/old/site && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/ugotscom/public_html/old/site --no-color core check-update --format=json Jan 11 05:22:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 05:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 05:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && timeout 60 /usr/local/bin/php -r 'require '"'"'/usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/wpt-wp-cli.php'"'"';' -d safe_mode=off -d display_errors=on -d opcache.enable_cli=off -d open_basedir= -d error_reporting=341 -d max_execution_time=60 --no-header -- --path=/home/wwwresourcehunte/public_html --no-color core check-update --format=json Jan 11 05:22:21 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 11 05:22:22 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 11 05:29:03 host sshd[23616]: Invalid user ci from 194.110.203.109 port 38514 Jan 11 05:29:03 host sshd[23616]: input_userauth_request: invalid user ci [preauth] Jan 11 05:29:03 host sshd[23616]: pam_unix(sshd:auth): check pass; user unknown Jan 11 05:29:03 host sshd[23616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 05:29:05 host sshd[23616]: Failed password for invalid user ci from 194.110.203.109 port 38514 ssh2 Jan 11 05:29:08 host sshd[23616]: pam_unix(sshd:auth): check pass; user unknown Jan 11 05:29:10 host sshd[23616]: Failed password for invalid user ci from 194.110.203.109 port 38514 ssh2 Jan 11 05:29:14 host sshd[23616]: pam_unix(sshd:auth): check pass; user unknown Jan 11 05:29:16 host sshd[23616]: Failed password for invalid user ci from 194.110.203.109 port 38514 ssh2 Jan 11 05:29:19 host sshd[23616]: Connection closed by 194.110.203.109 port 38514 [preauth] Jan 11 05:29:19 host sshd[23616]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 05:54:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:54:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:54:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:54:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:54:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:54:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 05:54:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 05:54:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:05:49 host sshd[29183]: Invalid user bciim from 205.185.113.129 port 44000 Jan 11 06:05:49 host sshd[29183]: input_userauth_request: invalid user bciim [preauth] Jan 11 06:05:49 host sshd[29183]: pam_unix(sshd:auth): check pass; user unknown Jan 11 06:05:49 host sshd[29183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 11 06:05:51 host sshd[29183]: Failed password for invalid user bciim from 205.185.113.129 port 44000 ssh2 Jan 11 06:05:51 host sshd[29183]: Connection closed by 205.185.113.129 port 44000 [preauth] Jan 11 06:14:32 host sshd[31870]: Connection closed by 45.79.181.179 port 24822 [preauth] Jan 11 06:14:34 host sshd[31879]: Connection closed by 45.79.181.179 port 24838 [preauth] Jan 11 06:14:36 host sshd[31886]: Connection closed by 45.79.181.179 port 24844 [preauth] Jan 11 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 06:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwtestugo user-2=shalinijames user-3=vfmassets user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=phmetals user-11=kottayamcalldriv user-12=gifterman user-13=palco123 user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 06:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GUBUkU1R8tZxVNtj.~ Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GUBUkU1R8tZxVNtj.~' Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GUBUkU1R8tZxVNtj.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 06:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 06:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 06:25:36 host sshd[1812]: ssh_dispatch_run_fatal: Connection from 207.229.167.36 port 47374: Connection corrupted [preauth] Jan 11 06:37:19 host sshd[3628]: Connection closed by 162.142.125.10 port 39782 [preauth] Jan 11 06:45:34 host sshd[4849]: Connection closed by 128.14.209.46 port 54662 [preauth] Jan 11 07:04:35 host sshd[7694]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 162.243.146.6 port 39272 Jan 11 07:12:37 host sshd[8834]: User root from 217.79.42.236 not allowed because not listed in AllowUsers Jan 11 07:12:37 host sshd[8834]: input_userauth_request: invalid user root [preauth] Jan 11 07:12:37 host unix_chkpwd[8837]: password check failed for user (root) Jan 11 07:12:37 host sshd[8834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.79.42.236 user=root Jan 11 07:12:37 host sshd[8834]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 07:12:39 host sshd[8834]: Failed password for invalid user root from 217.79.42.236 port 56834 ssh2 Jan 11 07:12:39 host sshd[8834]: Received disconnect from 217.79.42.236 port 56834:11: Bye Bye [preauth] Jan 11 07:12:39 host sshd[8834]: Disconnected from 217.79.42.236 port 56834 [preauth] Jan 11 07:17:43 host sshd[9835]: User root from 201.133.223.104 not allowed because not listed in AllowUsers Jan 11 07:17:43 host sshd[9835]: input_userauth_request: invalid user root [preauth] Jan 11 07:17:43 host unix_chkpwd[9839]: password check failed for user (root) Jan 11 07:17:43 host sshd[9835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.133.223.104 user=root Jan 11 07:17:43 host sshd[9835]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 07:17:45 host sshd[9835]: Failed password for invalid user root from 201.133.223.104 port 48630 ssh2 Jan 11 07:17:45 host sshd[9835]: Received disconnect from 201.133.223.104 port 48630:11: Bye Bye [preauth] Jan 11 07:17:45 host sshd[9835]: Disconnected from 201.133.223.104 port 48630 [preauth] Jan 11 07:18:16 host sshd[9951]: User root from 217.79.42.236 not allowed because not listed in AllowUsers Jan 11 07:18:16 host sshd[9951]: input_userauth_request: invalid user root [preauth] Jan 11 07:18:16 host unix_chkpwd[9956]: password check failed for user (root) Jan 11 07:18:16 host sshd[9951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.79.42.236 user=root Jan 11 07:18:16 host sshd[9951]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 07:18:18 host sshd[9951]: Failed password for invalid user root from 217.79.42.236 port 57078 ssh2 Jan 11 07:19:58 host sshd[10446]: User root from 201.133.223.104 not allowed because not listed in AllowUsers Jan 11 07:19:58 host sshd[10446]: input_userauth_request: invalid user root [preauth] Jan 11 07:19:58 host unix_chkpwd[10466]: password check failed for user (root) Jan 11 07:19:58 host sshd[10446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.133.223.104 user=root Jan 11 07:19:58 host sshd[10446]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 07:20:00 host sshd[10446]: Failed password for invalid user root from 201.133.223.104 port 43913 ssh2 Jan 11 07:20:01 host sshd[10446]: Received disconnect from 201.133.223.104 port 43913:11: Bye Bye [preauth] Jan 11 07:20:01 host sshd[10446]: Disconnected from 201.133.223.104 port 43913 [preauth] Jan 11 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 07:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=ugotscom user-12=disposeat user-13=remysagr user-14=wwwkmaorg user-15=woodpeck user-16=wwwkapin user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=straightcurve user-24=wwwletsstalkfood user-25=gifterman user-26=palco123 user-27=phmetals user-28=kottayamcalldriv user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 07:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PY0kBxztUDJ7Uoef.~ Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PY0kBxztUDJ7Uoef.~' Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PY0kBxztUDJ7Uoef.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 07:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 07:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 07:31:10 host sshd[13489]: Invalid user cj from 194.110.203.109 port 50706 Jan 11 07:31:10 host sshd[13489]: input_userauth_request: invalid user cj [preauth] Jan 11 07:31:10 host sshd[13489]: pam_unix(sshd:auth): check pass; user unknown Jan 11 07:31:10 host sshd[13489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 07:31:11 host sshd[13489]: Failed password for invalid user cj from 194.110.203.109 port 50706 ssh2 Jan 11 07:31:14 host sshd[13489]: pam_unix(sshd:auth): check pass; user unknown Jan 11 07:31:17 host sshd[13489]: Failed password for invalid user cj from 194.110.203.109 port 50706 ssh2 Jan 11 07:31:20 host sshd[13489]: pam_unix(sshd:auth): check pass; user unknown Jan 11 07:31:22 host sshd[13489]: Failed password for invalid user cj from 194.110.203.109 port 50706 ssh2 Jan 11 07:31:25 host sshd[13489]: Connection closed by 194.110.203.109 port 50706 [preauth] Jan 11 07:31:25 host sshd[13489]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 07:44:58 host sshd[15859]: Invalid user russell from 107.189.30.59 port 42944 Jan 11 07:44:58 host sshd[15859]: input_userauth_request: invalid user russell [preauth] Jan 11 07:44:58 host sshd[15859]: pam_unix(sshd:auth): check pass; user unknown Jan 11 07:44:58 host sshd[15859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 11 07:44:59 host sshd[15859]: Failed password for invalid user russell from 107.189.30.59 port 42944 ssh2 Jan 11 07:45:00 host sshd[15859]: Connection closed by 107.189.30.59 port 42944 [preauth] Jan 11 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=disposeat user-4=wwwkmaorg user-5=remysagr user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=straightcurve user-11=wwwletsstalkfood user-12=wwwevmhonda user-13=bonifacegroup user-14=mrsclean user-15=wwwnexidigital user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 08:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nzah5WcXuixsIDUr.~ Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nzah5WcXuixsIDUr.~' Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-nzah5WcXuixsIDUr.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 08:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 08:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:09:24 host sshd[29252]: User root from 89.236.112.100 not allowed because not listed in AllowUsers Jan 11 09:09:24 host sshd[29252]: input_userauth_request: invalid user root [preauth] Jan 11 09:09:25 host sshd[29252]: Connection closed by 89.236.112.100 port 60802 [preauth] Jan 11 09:09:28 host sshd[29260]: User root from 185.220.102.249 not allowed because not listed in AllowUsers Jan 11 09:09:28 host sshd[29260]: input_userauth_request: invalid user root [preauth] Jan 11 09:09:28 host unix_chkpwd[29286]: password check failed for user (root) Jan 11 09:09:28 host sshd[29260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.249 user=root Jan 11 09:09:28 host sshd[29260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:09:30 host sshd[29260]: Failed password for invalid user root from 185.220.102.249 port 13002 ssh2 Jan 11 09:09:31 host unix_chkpwd[29290]: password check failed for user (root) Jan 11 09:09:31 host sshd[29260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:09:33 host sshd[29260]: Failed password for invalid user root from 185.220.102.249 port 13002 ssh2 Jan 11 09:09:34 host unix_chkpwd[29297]: password check failed for user (root) Jan 11 09:09:34 host sshd[29260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:09:36 host sshd[29260]: Failed password for invalid user root from 185.220.102.249 port 13002 ssh2 Jan 11 09:09:37 host unix_chkpwd[29300]: password check failed for user (root) Jan 11 09:09:37 host sshd[29260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:09:39 host sshd[29260]: Failed password for invalid user root from 185.220.102.249 port 13002 ssh2 Jan 11 09:09:40 host unix_chkpwd[29305]: password check failed for user (root) Jan 11 09:09:40 host sshd[29260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:09:42 host sshd[29260]: Failed password for invalid user root from 185.220.102.249 port 13002 ssh2 Jan 11 09:09:43 host unix_chkpwd[29328]: password check failed for user (root) Jan 11 09:09:43 host sshd[29260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:09:45 host sshd[29260]: Failed password for invalid user root from 185.220.102.249 port 13002 ssh2 Jan 11 09:09:45 host sshd[29260]: error: maximum authentication attempts exceeded for invalid user root from 185.220.102.249 port 13002 ssh2 [preauth] Jan 11 09:09:45 host sshd[29260]: Disconnecting: Too many authentication failures [preauth] Jan 11 09:09:45 host sshd[29260]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.249 user=root Jan 11 09:09:45 host sshd[29260]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 11 09:10:15 host sshd[29401]: User root from 162.247.73.192 not allowed because not listed in AllowUsers Jan 11 09:10:15 host sshd[29401]: input_userauth_request: invalid user root [preauth] Jan 11 09:10:15 host unix_chkpwd[29411]: password check failed for user (root) Jan 11 09:10:15 host sshd[29401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.73.192 user=root Jan 11 09:10:15 host sshd[29401]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:10:17 host sshd[29401]: Failed password for invalid user root from 162.247.73.192 port 54306 ssh2 Jan 11 09:10:18 host unix_chkpwd[29416]: password check failed for user (root) Jan 11 09:10:18 host sshd[29401]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:10:20 host sshd[29401]: Failed password for invalid user root from 162.247.73.192 port 54306 ssh2 Jan 11 09:10:21 host unix_chkpwd[29421]: password check failed for user (root) Jan 11 09:10:21 host sshd[29401]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:10:23 host sshd[29401]: Failed password for invalid user root from 162.247.73.192 port 54306 ssh2 Jan 11 09:10:24 host unix_chkpwd[29425]: password check failed for user (root) Jan 11 09:10:24 host sshd[29401]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:10:26 host sshd[29401]: Failed password for invalid user root from 162.247.73.192 port 54306 ssh2 Jan 11 09:10:26 host unix_chkpwd[29435]: password check failed for user (root) Jan 11 09:10:26 host sshd[29401]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:10:28 host sshd[29401]: Failed password for invalid user root from 162.247.73.192 port 54306 ssh2 Jan 11 09:11:01 host sshd[29524]: User root from 162.247.72.199 not allowed because not listed in AllowUsers Jan 11 09:11:01 host sshd[29524]: input_userauth_request: invalid user root [preauth] Jan 11 09:11:01 host unix_chkpwd[29540]: password check failed for user (root) Jan 11 09:11:01 host sshd[29524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199 user=root Jan 11 09:11:01 host sshd[29524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:11:02 host sshd[29524]: Failed password for invalid user root from 162.247.72.199 port 60100 ssh2 Jan 11 09:11:04 host unix_chkpwd[29555]: password check failed for user (root) Jan 11 09:11:04 host sshd[29524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:11:06 host sshd[29524]: Failed password for invalid user root from 162.247.72.199 port 60100 ssh2 Jan 11 09:11:07 host unix_chkpwd[29560]: password check failed for user (root) Jan 11 09:11:07 host sshd[29524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:11:09 host sshd[29524]: Failed password for invalid user root from 162.247.72.199 port 60100 ssh2 Jan 11 09:11:11 host unix_chkpwd[29565]: password check failed for user (root) Jan 11 09:11:11 host sshd[29524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:11:12 host sshd[29524]: Failed password for invalid user root from 162.247.72.199 port 60100 ssh2 Jan 11 09:11:53 host sshd[29663]: User root from 162.247.74.217 not allowed because not listed in AllowUsers Jan 11 09:11:53 host sshd[29663]: input_userauth_request: invalid user root [preauth] Jan 11 09:11:53 host unix_chkpwd[29672]: password check failed for user (root) Jan 11 09:11:53 host sshd[29663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.217 user=root Jan 11 09:11:53 host sshd[29663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:11:55 host sshd[29663]: Failed password for invalid user root from 162.247.74.217 port 43260 ssh2 Jan 11 09:11:56 host unix_chkpwd[29678]: password check failed for user (root) Jan 11 09:11:56 host sshd[29663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:11:57 host sshd[29663]: Failed password for invalid user root from 162.247.74.217 port 43260 ssh2 Jan 11 09:11:58 host unix_chkpwd[29683]: password check failed for user (root) Jan 11 09:11:58 host sshd[29663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:12:00 host sshd[29663]: Failed password for invalid user root from 162.247.74.217 port 43260 ssh2 Jan 11 09:12:00 host unix_chkpwd[29688]: password check failed for user (root) Jan 11 09:12:00 host sshd[29663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:12:03 host sshd[29663]: Failed password for invalid user root from 162.247.74.217 port 43260 ssh2 Jan 11 09:12:36 host sshd[29799]: User root from 23.129.64.219 not allowed because not listed in AllowUsers Jan 11 09:12:36 host sshd[29799]: input_userauth_request: invalid user root [preauth] Jan 11 09:12:36 host unix_chkpwd[29816]: password check failed for user (root) Jan 11 09:12:36 host sshd[29799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.219 user=root Jan 11 09:12:36 host sshd[29799]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:12:38 host sshd[29799]: Failed password for invalid user root from 23.129.64.219 port 11072 ssh2 Jan 11 09:12:40 host unix_chkpwd[29821]: password check failed for user (root) Jan 11 09:12:40 host sshd[29799]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:12:41 host sshd[29799]: Failed password for invalid user root from 23.129.64.219 port 11072 ssh2 Jan 11 09:12:43 host unix_chkpwd[29824]: password check failed for user (root) Jan 11 09:12:43 host sshd[29799]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:12:44 host sshd[29799]: Failed password for invalid user root from 23.129.64.219 port 11072 ssh2 Jan 11 09:12:46 host unix_chkpwd[29829]: password check failed for user (root) Jan 11 09:12:46 host sshd[29799]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:12:48 host sshd[29799]: Failed password for invalid user root from 23.129.64.219 port 11072 ssh2 Jan 11 09:13:48 host sshd[29959]: User root from 150.117.197.6 not allowed because not listed in AllowUsers Jan 11 09:13:48 host sshd[29959]: input_userauth_request: invalid user root [preauth] Jan 11 09:13:48 host unix_chkpwd[29982]: password check failed for user (root) Jan 11 09:13:48 host sshd[29959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.117.197.6 user=root Jan 11 09:13:48 host sshd[29959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:13:50 host sshd[29959]: Failed password for invalid user root from 150.117.197.6 port 43624 ssh2 Jan 11 09:13:52 host unix_chkpwd[29988]: password check failed for user (root) Jan 11 09:13:52 host sshd[29959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:13:54 host sshd[29959]: Failed password for invalid user root from 150.117.197.6 port 43624 ssh2 Jan 11 09:13:56 host unix_chkpwd[29993]: password check failed for user (root) Jan 11 09:13:56 host sshd[29959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:13:58 host sshd[29959]: Failed password for invalid user root from 150.117.197.6 port 43624 ssh2 Jan 11 09:14:00 host unix_chkpwd[29999]: password check failed for user (root) Jan 11 09:14:00 host sshd[29959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:14:02 host sshd[29959]: Failed password for invalid user root from 150.117.197.6 port 43624 ssh2 Jan 11 09:14:12 host sshd[30164]: User root from 31.24.200.23 not allowed because not listed in AllowUsers Jan 11 09:14:12 host sshd[30164]: input_userauth_request: invalid user root [preauth] Jan 11 09:14:12 host unix_chkpwd[30168]: password check failed for user (root) Jan 11 09:14:12 host sshd[30164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.24.200.23 user=root Jan 11 09:14:12 host sshd[30164]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:14:14 host sshd[30164]: Failed password for invalid user root from 31.24.200.23 port 22954 ssh2 Jan 11 09:14:14 host sshd[30164]: Received disconnect from 31.24.200.23 port 22954:11: Bye Bye [preauth] Jan 11 09:14:14 host sshd[30164]: Disconnected from 31.24.200.23 port 22954 [preauth] Jan 11 09:14:40 host sshd[30218]: User root from 23.129.64.224 not allowed because not listed in AllowUsers Jan 11 09:14:40 host sshd[30218]: input_userauth_request: invalid user root [preauth] Jan 11 09:14:40 host unix_chkpwd[30227]: password check failed for user (root) Jan 11 09:14:40 host sshd[30218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.224 user=root Jan 11 09:14:40 host sshd[30218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:14:42 host sshd[30218]: Failed password for invalid user root from 23.129.64.224 port 56104 ssh2 Jan 11 09:14:43 host unix_chkpwd[30235]: password check failed for user (root) Jan 11 09:14:43 host sshd[30218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:14:45 host sshd[30218]: Failed password for invalid user root from 23.129.64.224 port 56104 ssh2 Jan 11 09:14:46 host unix_chkpwd[30238]: password check failed for user (root) Jan 11 09:14:46 host sshd[30218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:14:48 host sshd[30218]: Failed password for invalid user root from 23.129.64.224 port 56104 ssh2 Jan 11 09:14:49 host unix_chkpwd[30242]: password check failed for user (root) Jan 11 09:14:49 host sshd[30218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:14:51 host sshd[30218]: Failed password for invalid user root from 23.129.64.224 port 56104 ssh2 Jan 11 09:15:25 host sshd[30344]: User root from 185.129.61.129 not allowed because not listed in AllowUsers Jan 11 09:15:25 host sshd[30344]: input_userauth_request: invalid user root [preauth] Jan 11 09:15:25 host unix_chkpwd[30354]: password check failed for user (root) Jan 11 09:15:25 host sshd[30344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.61.129 user=root Jan 11 09:15:25 host sshd[30344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:15:27 host sshd[30344]: Failed password for invalid user root from 185.129.61.129 port 56208 ssh2 Jan 11 09:15:27 host unix_chkpwd[30360]: password check failed for user (root) Jan 11 09:15:27 host sshd[30344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:15:30 host sshd[30344]: Failed password for invalid user root from 185.129.61.129 port 56208 ssh2 Jan 11 09:15:30 host unix_chkpwd[30383]: password check failed for user (root) Jan 11 09:15:30 host sshd[30344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:15:32 host sshd[30344]: Failed password for invalid user root from 185.129.61.129 port 56208 ssh2 Jan 11 09:15:32 host unix_chkpwd[30389]: password check failed for user (root) Jan 11 09:15:32 host sshd[30344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:15:35 host sshd[30344]: Failed password for invalid user root from 185.129.61.129 port 56208 ssh2 Jan 11 09:15:35 host unix_chkpwd[30392]: password check failed for user (root) Jan 11 09:15:35 host sshd[30344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:15:37 host sshd[30344]: Failed password for invalid user root from 185.129.61.129 port 56208 ssh2 Jan 11 09:15:37 host unix_chkpwd[30414]: password check failed for user (root) Jan 11 09:15:37 host sshd[30344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:15:39 host sshd[30344]: Failed password for invalid user root from 185.129.61.129 port 56208 ssh2 Jan 11 09:15:39 host sshd[30344]: error: maximum authentication attempts exceeded for invalid user root from 185.129.61.129 port 56208 ssh2 [preauth] Jan 11 09:15:39 host sshd[30344]: Disconnecting: Too many authentication failures [preauth] Jan 11 09:15:39 host sshd[30344]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.61.129 user=root Jan 11 09:15:39 host sshd[30344]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 11 09:16:04 host sshd[30485]: User root from 41.222.0.16 not allowed because not listed in AllowUsers Jan 11 09:16:04 host sshd[30485]: input_userauth_request: invalid user root [preauth] Jan 11 09:16:04 host unix_chkpwd[30488]: password check failed for user (root) Jan 11 09:16:04 host sshd[30485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.222.0.16 user=root Jan 11 09:16:04 host sshd[30485]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:16:06 host sshd[30485]: Failed password for invalid user root from 41.222.0.16 port 43502 ssh2 Jan 11 09:16:07 host sshd[30485]: Received disconnect from 41.222.0.16 port 43502:11: Bye Bye [preauth] Jan 11 09:16:07 host sshd[30485]: Disconnected from 41.222.0.16 port 43502 [preauth] Jan 11 09:16:09 host sshd[30492]: User root from 104.244.76.170 not allowed because not listed in AllowUsers Jan 11 09:16:09 host sshd[30492]: input_userauth_request: invalid user root [preauth] Jan 11 09:16:09 host unix_chkpwd[30496]: password check failed for user (root) Jan 11 09:16:09 host sshd[30492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.76.170 user=root Jan 11 09:16:09 host sshd[30492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:16:12 host sshd[30492]: Failed password for invalid user root from 104.244.76.170 port 56510 ssh2 Jan 11 09:16:13 host unix_chkpwd[30501]: password check failed for user (root) Jan 11 09:16:13 host sshd[30492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:16:15 host sshd[30492]: Failed password for invalid user root from 104.244.76.170 port 56510 ssh2 Jan 11 09:16:16 host unix_chkpwd[30507]: password check failed for user (root) Jan 11 09:16:16 host sshd[30492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:16:16 host sshd[30504]: User root from 31.24.200.23 not allowed because not listed in AllowUsers Jan 11 09:16:16 host sshd[30504]: input_userauth_request: invalid user root [preauth] Jan 11 09:16:16 host unix_chkpwd[30508]: password check failed for user (root) Jan 11 09:16:16 host sshd[30504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.24.200.23 user=root Jan 11 09:16:16 host sshd[30504]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:16:18 host sshd[30492]: Failed password for invalid user root from 104.244.76.170 port 56510 ssh2 Jan 11 09:16:19 host unix_chkpwd[30511]: password check failed for user (root) Jan 11 09:16:19 host sshd[30492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:16:19 host sshd[30504]: Failed password for invalid user root from 31.24.200.23 port 50926 ssh2 Jan 11 09:16:19 host sshd[30504]: Received disconnect from 31.24.200.23 port 50926:11: Bye Bye [preauth] Jan 11 09:16:19 host sshd[30504]: Disconnected from 31.24.200.23 port 50926 [preauth] Jan 11 09:16:21 host sshd[30492]: Failed password for invalid user root from 104.244.76.170 port 56510 ssh2 Jan 11 09:16:21 host unix_chkpwd[30514]: password check failed for user (root) Jan 11 09:16:21 host sshd[30492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:16:24 host sshd[30492]: Failed password for invalid user root from 104.244.76.170 port 56510 ssh2 Jan 11 09:17:10 host sshd[30653]: User root from 185.67.82.114 not allowed because not listed in AllowUsers Jan 11 09:17:10 host sshd[30653]: input_userauth_request: invalid user root [preauth] Jan 11 09:17:10 host unix_chkpwd[30666]: password check failed for user (root) Jan 11 09:17:10 host sshd[30653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.67.82.114 user=root Jan 11 09:17:10 host sshd[30653]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:17:13 host sshd[30653]: Failed password for invalid user root from 185.67.82.114 port 46630 ssh2 Jan 11 09:17:14 host unix_chkpwd[30673]: password check failed for user (root) Jan 11 09:17:14 host sshd[30653]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:17:15 host sshd[30653]: Failed password for invalid user root from 185.67.82.114 port 46630 ssh2 Jan 11 09:17:16 host unix_chkpwd[30676]: password check failed for user (root) Jan 11 09:17:16 host sshd[30653]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:17:19 host sshd[30653]: Failed password for invalid user root from 185.67.82.114 port 46630 ssh2 Jan 11 09:17:20 host unix_chkpwd[30682]: password check failed for user (root) Jan 11 09:17:20 host sshd[30653]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:17:23 host sshd[30653]: Failed password for invalid user root from 185.67.82.114 port 46630 ssh2 Jan 11 09:18:04 host sshd[30808]: User root from 41.222.0.16 not allowed because not listed in AllowUsers Jan 11 09:18:04 host sshd[30808]: input_userauth_request: invalid user root [preauth] Jan 11 09:18:04 host unix_chkpwd[30811]: password check failed for user (root) Jan 11 09:18:04 host sshd[30808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.222.0.16 user=root Jan 11 09:18:04 host sshd[30808]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:18:07 host sshd[30808]: Failed password for invalid user root from 41.222.0.16 port 47382 ssh2 Jan 11 09:18:07 host sshd[30808]: Received disconnect from 41.222.0.16 port 47382:11: Bye Bye [preauth] Jan 11 09:18:07 host sshd[30808]: Disconnected from 41.222.0.16 port 47382 [preauth] Jan 11 09:18:33 host sshd[30917]: User root from 171.25.193.25 not allowed because not listed in AllowUsers Jan 11 09:18:33 host sshd[30917]: input_userauth_request: invalid user root [preauth] Jan 11 09:18:33 host unix_chkpwd[30925]: password check failed for user (root) Jan 11 09:18:33 host sshd[30917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.25 user=root Jan 11 09:18:33 host sshd[30917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:18:35 host sshd[30917]: Failed password for invalid user root from 171.25.193.25 port 24357 ssh2 Jan 11 09:18:36 host unix_chkpwd[30935]: password check failed for user (root) Jan 11 09:18:36 host sshd[30917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:18:38 host sshd[30917]: Failed password for invalid user root from 171.25.193.25 port 24357 ssh2 Jan 11 09:18:39 host unix_chkpwd[30938]: password check failed for user (root) Jan 11 09:18:39 host sshd[30917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:18:41 host sshd[30917]: Failed password for invalid user root from 171.25.193.25 port 24357 ssh2 Jan 11 09:19:24 host sshd[31148]: User root from 185.38.175.131 not allowed because not listed in AllowUsers Jan 11 09:19:24 host sshd[31148]: input_userauth_request: invalid user root [preauth] Jan 11 09:19:25 host unix_chkpwd[31152]: password check failed for user (root) Jan 11 09:19:25 host sshd[31148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.38.175.131 user=root Jan 11 09:19:25 host sshd[31148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:19:26 host sshd[31148]: Failed password for invalid user root from 185.38.175.131 port 49034 ssh2 Jan 11 09:19:26 host unix_chkpwd[31154]: password check failed for user (root) Jan 11 09:19:26 host sshd[31148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:19:28 host sshd[31148]: Failed password for invalid user root from 185.38.175.131 port 49034 ssh2 Jan 11 09:19:29 host unix_chkpwd[31178]: password check failed for user (root) Jan 11 09:19:29 host sshd[31148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:19:31 host sshd[31148]: Failed password for invalid user root from 185.38.175.131 port 49034 ssh2 Jan 11 09:19:31 host unix_chkpwd[31186]: password check failed for user (root) Jan 11 09:19:31 host sshd[31148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:19:33 host sshd[31148]: Failed password for invalid user root from 185.38.175.131 port 49034 ssh2 Jan 11 09:20:09 host sshd[31320]: User root from 179.43.159.194 not allowed because not listed in AllowUsers Jan 11 09:20:09 host sshd[31320]: input_userauth_request: invalid user root [preauth] Jan 11 09:20:09 host unix_chkpwd[31329]: password check failed for user (root) Jan 11 09:20:09 host sshd[31320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.159.194 user=root Jan 11 09:20:09 host sshd[31320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:20:11 host sshd[31320]: Failed password for invalid user root from 179.43.159.194 port 36780 ssh2 Jan 11 09:20:12 host unix_chkpwd[31335]: password check failed for user (root) Jan 11 09:20:12 host sshd[31320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:20:14 host sshd[31320]: Failed password for invalid user root from 179.43.159.194 port 36780 ssh2 Jan 11 09:20:15 host unix_chkpwd[31340]: password check failed for user (root) Jan 11 09:20:15 host sshd[31320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:20:17 host sshd[31320]: Failed password for invalid user root from 179.43.159.194 port 36780 ssh2 Jan 11 09:20:19 host unix_chkpwd[31361]: password check failed for user (root) Jan 11 09:20:19 host sshd[31320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:20:21 host sshd[31320]: Failed password for invalid user root from 179.43.159.194 port 36780 ssh2 Jan 11 09:20:21 host unix_chkpwd[31364]: password check failed for user (root) Jan 11 09:20:21 host sshd[31320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:20:24 host sshd[31320]: Failed password for invalid user root from 179.43.159.194 port 36780 ssh2 Jan 11 09:20:53 host sshd[31457]: User root from 185.220.103.7 not allowed because not listed in AllowUsers Jan 11 09:20:53 host sshd[31457]: input_userauth_request: invalid user root [preauth] Jan 11 09:20:53 host unix_chkpwd[31463]: password check failed for user (root) Jan 11 09:20:53 host sshd[31457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.7 user=root Jan 11 09:20:53 host sshd[31457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:20:54 host sshd[31457]: Failed password for invalid user root from 185.220.103.7 port 53570 ssh2 Jan 11 09:20:55 host unix_chkpwd[31468]: password check failed for user (root) Jan 11 09:20:55 host sshd[31457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:20:57 host sshd[31457]: Failed password for invalid user root from 185.220.103.7 port 53570 ssh2 Jan 11 09:20:57 host unix_chkpwd[31473]: password check failed for user (root) Jan 11 09:20:57 host sshd[31457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:20:59 host sshd[31457]: Failed password for invalid user root from 185.220.103.7 port 53570 ssh2 Jan 11 09:20:59 host unix_chkpwd[31478]: password check failed for user (root) Jan 11 09:20:59 host sshd[31457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:21:01 host sshd[31457]: Failed password for invalid user root from 185.220.103.7 port 53570 ssh2 Jan 11 09:21:02 host unix_chkpwd[31497]: password check failed for user (root) Jan 11 09:21:02 host sshd[31457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:21:04 host sshd[31457]: Failed password for invalid user root from 185.220.103.7 port 53570 ssh2 Jan 11 09:21:43 host sshd[31602]: User root from 162.247.74.74 not allowed because not listed in AllowUsers Jan 11 09:21:43 host sshd[31602]: input_userauth_request: invalid user root [preauth] Jan 11 09:21:43 host unix_chkpwd[31614]: password check failed for user (root) Jan 11 09:21:43 host sshd[31602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.74 user=root Jan 11 09:21:43 host sshd[31602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:21:45 host sshd[31602]: Failed password for invalid user root from 162.247.74.74 port 44198 ssh2 Jan 11 09:21:46 host unix_chkpwd[31618]: password check failed for user (root) Jan 11 09:21:46 host sshd[31602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:21:48 host sshd[31602]: Failed password for invalid user root from 162.247.74.74 port 44198 ssh2 Jan 11 09:21:50 host unix_chkpwd[31622]: password check failed for user (root) Jan 11 09:21:50 host sshd[31602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:21:52 host sshd[31602]: Failed password for invalid user root from 162.247.74.74 port 44198 ssh2 Jan 11 09:21:53 host unix_chkpwd[31626]: password check failed for user (root) Jan 11 09:21:53 host sshd[31602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:21:55 host sshd[31602]: Failed password for invalid user root from 162.247.74.74 port 44198 ssh2 Jan 11 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:56 host unix_chkpwd[31685]: password check failed for user (root) Jan 11 09:21:56 host sshd[31602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwnexidigital user-15=mrsclean user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 09:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-C854UAwlFxu2D2zW.~ Jan 11 09:21:58 host sshd[31602]: Failed password for invalid user root from 162.247.74.74 port 44198 ssh2 Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-C854UAwlFxu2D2zW.~' Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-C854UAwlFxu2D2zW.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 09:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 09:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 09:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 09:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 09:22:34 host sshd[31964]: User root from 171.25.193.234 not allowed because not listed in AllowUsers Jan 11 09:22:34 host sshd[31964]: input_userauth_request: invalid user root [preauth] Jan 11 09:22:34 host unix_chkpwd[31971]: password check failed for user (root) Jan 11 09:22:34 host sshd[31964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.234 user=root Jan 11 09:22:34 host sshd[31964]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:22:37 host sshd[31964]: Failed password for invalid user root from 171.25.193.234 port 30965 ssh2 Jan 11 09:22:37 host unix_chkpwd[31978]: password check failed for user (root) Jan 11 09:22:37 host sshd[31964]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:22:39 host sshd[31964]: Failed password for invalid user root from 171.25.193.234 port 30965 ssh2 Jan 11 09:22:40 host unix_chkpwd[31981]: password check failed for user (root) Jan 11 09:22:40 host sshd[31964]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:22:42 host sshd[31964]: Failed password for invalid user root from 171.25.193.234 port 30965 ssh2 Jan 11 09:22:43 host unix_chkpwd[31985]: password check failed for user (root) Jan 11 09:22:43 host sshd[31964]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:22:45 host sshd[31964]: Failed password for invalid user root from 171.25.193.234 port 30965 ssh2 Jan 11 09:22:46 host unix_chkpwd[31988]: password check failed for user (root) Jan 11 09:22:46 host sshd[31964]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:22:48 host sshd[31964]: Failed password for invalid user root from 171.25.193.234 port 30965 ssh2 Jan 11 09:23:30 host sshd[32072]: User root from 185.220.102.243 not allowed because not listed in AllowUsers Jan 11 09:23:30 host sshd[32072]: input_userauth_request: invalid user root [preauth] Jan 11 09:23:30 host unix_chkpwd[32108]: password check failed for user (root) Jan 11 09:23:30 host sshd[32072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.243 user=root Jan 11 09:23:30 host sshd[32072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:23:31 host sshd[32072]: Failed password for invalid user root from 185.220.102.243 port 22196 ssh2 Jan 11 09:23:32 host unix_chkpwd[32113]: password check failed for user (root) Jan 11 09:23:32 host sshd[32072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:23:35 host sshd[32072]: Failed password for invalid user root from 185.220.102.243 port 22196 ssh2 Jan 11 09:23:35 host unix_chkpwd[32117]: password check failed for user (root) Jan 11 09:23:35 host sshd[32072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:23:38 host sshd[32072]: Failed password for invalid user root from 185.220.102.243 port 22196 ssh2 Jan 11 09:23:39 host unix_chkpwd[32122]: password check failed for user (root) Jan 11 09:23:39 host sshd[32072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:23:39 host sshd[32123]: Bad protocol version identification '\026\003\001' from 106.75.24.102 port 45980 Jan 11 09:23:41 host sshd[32072]: Failed password for invalid user root from 185.220.102.243 port 22196 ssh2 Jan 11 09:23:42 host unix_chkpwd[32133]: password check failed for user (root) Jan 11 09:23:42 host sshd[32072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:23:44 host sshd[32072]: Failed password for invalid user root from 185.220.102.243 port 22196 ssh2 Jan 11 09:24:14 host sshd[32209]: User root from 23.129.64.131 not allowed because not listed in AllowUsers Jan 11 09:24:14 host sshd[32209]: input_userauth_request: invalid user root [preauth] Jan 11 09:24:14 host unix_chkpwd[32212]: password check failed for user (root) Jan 11 09:24:14 host sshd[32209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.131 user=root Jan 11 09:24:14 host sshd[32209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:24:16 host sshd[32209]: Failed password for invalid user root from 23.129.64.131 port 56446 ssh2 Jan 11 09:24:17 host unix_chkpwd[32217]: password check failed for user (root) Jan 11 09:24:17 host sshd[32209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:24:19 host sshd[32209]: Failed password for invalid user root from 23.129.64.131 port 56446 ssh2 Jan 11 09:24:20 host unix_chkpwd[32222]: password check failed for user (root) Jan 11 09:24:20 host sshd[32209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:24:22 host sshd[32209]: Failed password for invalid user root from 23.129.64.131 port 56446 ssh2 Jan 11 09:24:23 host unix_chkpwd[32225]: password check failed for user (root) Jan 11 09:24:23 host sshd[32209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:24:25 host sshd[32209]: Failed password for invalid user root from 23.129.64.131 port 56446 ssh2 Jan 11 09:24:25 host unix_chkpwd[32228]: password check failed for user (root) Jan 11 09:24:25 host sshd[32209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:24:27 host sshd[32209]: Failed password for invalid user root from 23.129.64.131 port 56446 ssh2 Jan 11 09:24:28 host unix_chkpwd[32250]: password check failed for user (root) Jan 11 09:24:28 host sshd[32209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:24:29 host sshd[32209]: Failed password for invalid user root from 23.129.64.131 port 56446 ssh2 Jan 11 09:24:29 host sshd[32209]: error: maximum authentication attempts exceeded for invalid user root from 23.129.64.131 port 56446 ssh2 [preauth] Jan 11 09:24:29 host sshd[32209]: Disconnecting: Too many authentication failures [preauth] Jan 11 09:24:29 host sshd[32209]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.131 user=root Jan 11 09:24:29 host sshd[32209]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 11 09:25:03 host sshd[32420]: User root from 23.129.64.227 not allowed because not listed in AllowUsers Jan 11 09:25:03 host sshd[32420]: input_userauth_request: invalid user root [preauth] Jan 11 09:25:03 host unix_chkpwd[32455]: password check failed for user (root) Jan 11 09:25:03 host sshd[32420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.227 user=root Jan 11 09:25:03 host sshd[32420]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:25:04 host sshd[32420]: Failed password for invalid user root from 23.129.64.227 port 60906 ssh2 Jan 11 09:25:06 host unix_chkpwd[32461]: password check failed for user (root) Jan 11 09:25:06 host sshd[32420]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:25:08 host sshd[32420]: Failed password for invalid user root from 23.129.64.227 port 60906 ssh2 Jan 11 09:25:09 host unix_chkpwd[32465]: password check failed for user (root) Jan 11 09:25:09 host sshd[32420]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:25:12 host sshd[32420]: Failed password for invalid user root from 23.129.64.227 port 60906 ssh2 Jan 11 09:25:13 host unix_chkpwd[32487]: password check failed for user (root) Jan 11 09:25:13 host sshd[32420]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:25:14 host sshd[32420]: Failed password for invalid user root from 23.129.64.227 port 60906 ssh2 Jan 11 09:25:56 host sshd[32571]: User root from 162.247.74.200 not allowed because not listed in AllowUsers Jan 11 09:25:56 host sshd[32571]: input_userauth_request: invalid user root [preauth] Jan 11 09:25:56 host unix_chkpwd[32575]: password check failed for user (root) Jan 11 09:25:56 host sshd[32571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.200 user=root Jan 11 09:25:56 host sshd[32571]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:25:57 host sshd[32571]: Failed password for invalid user root from 162.247.74.200 port 34714 ssh2 Jan 11 09:25:59 host unix_chkpwd[32580]: password check failed for user (root) Jan 11 09:25:59 host sshd[32571]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:26:01 host sshd[32571]: Failed password for invalid user root from 162.247.74.200 port 34714 ssh2 Jan 11 09:26:01 host unix_chkpwd[32591]: password check failed for user (root) Jan 11 09:26:01 host sshd[32571]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:26:03 host sshd[32571]: Failed password for invalid user root from 162.247.74.200 port 34714 ssh2 Jan 11 09:26:04 host unix_chkpwd[32607]: password check failed for user (root) Jan 11 09:26:04 host sshd[32571]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:26:06 host sshd[32571]: Failed password for invalid user root from 162.247.74.200 port 34714 ssh2 Jan 11 09:26:06 host unix_chkpwd[32614]: password check failed for user (root) Jan 11 09:26:06 host sshd[32571]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:26:08 host sshd[32571]: Failed password for invalid user root from 162.247.74.200 port 34714 ssh2 Jan 11 09:26:49 host sshd[32719]: User root from 162.247.74.204 not allowed because not listed in AllowUsers Jan 11 09:26:49 host sshd[32719]: input_userauth_request: invalid user root [preauth] Jan 11 09:26:49 host unix_chkpwd[32723]: password check failed for user (root) Jan 11 09:26:49 host sshd[32719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.204 user=root Jan 11 09:26:49 host sshd[32719]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:26:51 host sshd[32719]: Failed password for invalid user root from 162.247.74.204 port 46226 ssh2 Jan 11 09:26:51 host unix_chkpwd[32728]: password check failed for user (root) Jan 11 09:26:51 host sshd[32719]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:26:53 host sshd[32719]: Failed password for invalid user root from 162.247.74.204 port 46226 ssh2 Jan 11 09:26:53 host unix_chkpwd[32733]: password check failed for user (root) Jan 11 09:26:53 host sshd[32719]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:26:55 host sshd[32719]: Failed password for invalid user root from 162.247.74.204 port 46226 ssh2 Jan 11 09:26:56 host unix_chkpwd[32752]: password check failed for user (root) Jan 11 09:26:56 host sshd[32719]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:26:58 host sshd[32719]: Failed password for invalid user root from 162.247.74.204 port 46226 ssh2 Jan 11 09:28:08 host sshd[500]: User root from 162.247.74.216 not allowed because not listed in AllowUsers Jan 11 09:28:08 host sshd[500]: input_userauth_request: invalid user root [preauth] Jan 11 09:28:08 host unix_chkpwd[507]: password check failed for user (root) Jan 11 09:28:08 host sshd[500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.216 user=root Jan 11 09:28:08 host sshd[500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:28:10 host sshd[500]: Failed password for invalid user root from 162.247.74.216 port 58398 ssh2 Jan 11 09:28:11 host unix_chkpwd[511]: password check failed for user (root) Jan 11 09:28:11 host sshd[500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:28:13 host sshd[500]: Failed password for invalid user root from 162.247.74.216 port 58398 ssh2 Jan 11 09:28:14 host unix_chkpwd[514]: password check failed for user (root) Jan 11 09:28:14 host sshd[500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:28:16 host sshd[500]: Failed password for invalid user root from 162.247.74.216 port 58398 ssh2 Jan 11 09:28:17 host unix_chkpwd[526]: password check failed for user (root) Jan 11 09:28:17 host sshd[500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:28:20 host sshd[500]: Failed password for invalid user root from 162.247.74.216 port 58398 ssh2 Jan 11 09:29:10 host sshd[679]: User root from 185.220.102.245 not allowed because not listed in AllowUsers Jan 11 09:29:10 host sshd[679]: input_userauth_request: invalid user root [preauth] Jan 11 09:29:10 host unix_chkpwd[683]: password check failed for user (root) Jan 11 09:29:10 host sshd[679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.245 user=root Jan 11 09:29:10 host sshd[679]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:29:12 host sshd[679]: Failed password for invalid user root from 185.220.102.245 port 15074 ssh2 Jan 11 09:29:12 host unix_chkpwd[690]: password check failed for user (root) Jan 11 09:29:12 host sshd[679]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:29:14 host sshd[679]: Failed password for invalid user root from 185.220.102.245 port 15074 ssh2 Jan 11 09:29:14 host unix_chkpwd[692]: password check failed for user (root) Jan 11 09:29:14 host sshd[679]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:29:17 host sshd[679]: Failed password for invalid user root from 185.220.102.245 port 15074 ssh2 Jan 11 09:29:17 host unix_chkpwd[696]: password check failed for user (root) Jan 11 09:29:17 host sshd[679]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:29:19 host sshd[679]: Failed password for invalid user root from 185.220.102.245 port 15074 ssh2 Jan 11 09:29:52 host sshd[889]: User root from 185.112.147.10 not allowed because not listed in AllowUsers Jan 11 09:29:52 host sshd[889]: input_userauth_request: invalid user root [preauth] Jan 11 09:29:52 host unix_chkpwd[895]: password check failed for user (root) Jan 11 09:29:52 host sshd[889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.112.147.10 user=root Jan 11 09:29:52 host sshd[889]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:29:54 host sshd[889]: Failed password for invalid user root from 185.112.147.10 port 54326 ssh2 Jan 11 09:29:56 host unix_chkpwd[901]: password check failed for user (root) Jan 11 09:29:56 host sshd[889]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:29:58 host sshd[889]: Failed password for invalid user root from 185.112.147.10 port 54326 ssh2 Jan 11 09:29:59 host unix_chkpwd[905]: password check failed for user (root) Jan 11 09:29:59 host sshd[889]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:30:02 host sshd[889]: Failed password for invalid user root from 185.112.147.10 port 54326 ssh2 Jan 11 09:30:03 host unix_chkpwd[956]: password check failed for user (root) Jan 11 09:30:03 host sshd[889]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:30:05 host sshd[889]: Failed password for invalid user root from 185.112.147.10 port 54326 ssh2 Jan 11 09:30:46 host sshd[1047]: User root from 198.98.60.107 not allowed because not listed in AllowUsers Jan 11 09:30:46 host sshd[1047]: input_userauth_request: invalid user root [preauth] Jan 11 09:30:46 host unix_chkpwd[1052]: password check failed for user (root) Jan 11 09:30:46 host sshd[1047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.60.107 user=root Jan 11 09:30:46 host sshd[1047]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:30:49 host sshd[1047]: Failed password for invalid user root from 198.98.60.107 port 42872 ssh2 Jan 11 09:30:49 host unix_chkpwd[1057]: password check failed for user (root) Jan 11 09:30:49 host sshd[1047]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:30:51 host sshd[1047]: Failed password for invalid user root from 198.98.60.107 port 42872 ssh2 Jan 11 09:30:51 host unix_chkpwd[1059]: password check failed for user (root) Jan 11 09:30:51 host sshd[1047]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:30:53 host sshd[1047]: Failed password for invalid user root from 198.98.60.107 port 42872 ssh2 Jan 11 09:30:53 host unix_chkpwd[1062]: password check failed for user (root) Jan 11 09:30:53 host sshd[1047]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:30:56 host sshd[1047]: Failed password for invalid user root from 198.98.60.107 port 42872 ssh2 Jan 11 09:30:56 host unix_chkpwd[1065]: password check failed for user (root) Jan 11 09:30:56 host sshd[1047]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:30:58 host sshd[1047]: Failed password for invalid user root from 198.98.60.107 port 42872 ssh2 Jan 11 09:31:46 host sshd[1198]: Invalid user ck from 194.110.203.109 port 38396 Jan 11 09:31:46 host sshd[1198]: input_userauth_request: invalid user ck [preauth] Jan 11 09:31:46 host sshd[1198]: pam_unix(sshd:auth): check pass; user unknown Jan 11 09:31:46 host sshd[1198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 09:31:48 host sshd[1198]: Failed password for invalid user ck from 194.110.203.109 port 38396 ssh2 Jan 11 09:31:51 host sshd[1198]: pam_unix(sshd:auth): check pass; user unknown Jan 11 09:31:53 host sshd[1198]: Failed password for invalid user ck from 194.110.203.109 port 38396 ssh2 Jan 11 09:31:56 host sshd[1198]: pam_unix(sshd:auth): check pass; user unknown Jan 11 09:31:58 host sshd[1198]: Failed password for invalid user ck from 194.110.203.109 port 38396 ssh2 Jan 11 09:32:01 host sshd[1198]: Connection closed by 194.110.203.109 port 38396 [preauth] Jan 11 09:32:01 host sshd[1198]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 09:32:35 host sshd[1288]: User root from 162.247.74.7 not allowed because not listed in AllowUsers Jan 11 09:32:35 host sshd[1288]: input_userauth_request: invalid user root [preauth] Jan 11 09:32:35 host unix_chkpwd[1298]: password check failed for user (root) Jan 11 09:32:35 host sshd[1288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.7 user=root Jan 11 09:32:35 host sshd[1288]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:32:37 host sshd[1288]: Failed password for invalid user root from 162.247.74.7 port 57950 ssh2 Jan 11 09:32:38 host unix_chkpwd[1301]: password check failed for user (root) Jan 11 09:32:38 host sshd[1288]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 09:32:40 host sshd[1288]: Failed password for invalid user root from 162.247.74.7 port 57950 ssh2 Jan 11 09:32:41 host sshd[1288]: Connection closed by 162.247.74.7 port 57950 [preauth] Jan 11 09:32:41 host sshd[1288]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.7 user=root Jan 11 10:00:53 host sshd[5197]: Invalid user intermec from 205.185.113.129 port 58692 Jan 11 10:00:53 host sshd[5197]: input_userauth_request: invalid user intermec [preauth] Jan 11 10:00:53 host sshd[5197]: pam_unix(sshd:auth): check pass; user unknown Jan 11 10:00:53 host sshd[5197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 11 10:00:55 host sshd[5197]: Failed password for invalid user intermec from 205.185.113.129 port 58692 ssh2 Jan 11 10:00:55 host sshd[5197]: Connection closed by 205.185.113.129 port 58692 [preauth] Jan 11 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 10:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 10:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BOr455AfABKFP6fA.~ Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BOr455AfABKFP6fA.~' Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-BOr455AfABKFP6fA.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 10:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 10:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 10:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 10:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 10:47:29 host sshd[12252]: Connection closed by 194.180.48.37 port 37194 [preauth] Jan 11 10:54:26 host sshd[13137]: Connection reset by 205.210.31.144 port 65462 [preauth] Jan 11 11:05:34 host sshd[14739]: User root from 91.239.206.219 not allowed because not listed in AllowUsers Jan 11 11:05:34 host sshd[14739]: input_userauth_request: invalid user root [preauth] Jan 11 11:05:34 host unix_chkpwd[14743]: password check failed for user (root) Jan 11 11:05:34 host sshd[14739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.239.206.219 user=root Jan 11 11:05:34 host sshd[14739]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 11:05:36 host sshd[14739]: Failed password for invalid user root from 91.239.206.219 port 54500 ssh2 Jan 11 11:05:36 host sshd[14739]: Received disconnect from 91.239.206.219 port 54500:11: Bye Bye [preauth] Jan 11 11:05:36 host sshd[14739]: Disconnected from 91.239.206.219 port 54500 [preauth] Jan 11 11:09:34 host sshd[15355]: Bad protocol version identification 'GET / HTTP/1.1' from 189.217.192.45 port 46938 Jan 11 11:09:37 host sshd[15357]: User root from 189.217.192.45 not allowed because not listed in AllowUsers Jan 11 11:09:37 host sshd[15357]: input_userauth_request: invalid user root [preauth] Jan 11 11:09:38 host unix_chkpwd[15365]: password check failed for user (root) Jan 11 11:09:38 host sshd[15357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.217.192.45 user=root Jan 11 11:09:38 host sshd[15357]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 11:09:40 host sshd[15357]: Failed password for invalid user root from 189.217.192.45 port 47012 ssh2 Jan 11 11:09:40 host sshd[15357]: Connection closed by 189.217.192.45 port 47012 [preauth] Jan 11 11:09:43 host sshd[15372]: User root from 189.217.192.45 not allowed because not listed in AllowUsers Jan 11 11:09:43 host sshd[15372]: input_userauth_request: invalid user root [preauth] Jan 11 11:09:44 host unix_chkpwd[15376]: password check failed for user (root) Jan 11 11:09:44 host sshd[15372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.217.192.45 user=root Jan 11 11:09:44 host sshd[15372]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 11:09:46 host sshd[15372]: Failed password for invalid user root from 189.217.192.45 port 47813 ssh2 Jan 11 11:09:46 host sshd[15372]: Connection closed by 189.217.192.45 port 47813 [preauth] Jan 11 11:10:52 host sshd[15544]: User root from 91.239.206.219 not allowed because not listed in AllowUsers Jan 11 11:10:52 host sshd[15544]: input_userauth_request: invalid user root [preauth] Jan 11 11:10:52 host unix_chkpwd[15548]: password check failed for user (root) Jan 11 11:10:52 host sshd[15544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.239.206.219 user=root Jan 11 11:10:52 host sshd[15544]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 11:10:54 host sshd[15544]: Failed password for invalid user root from 91.239.206.219 port 52930 ssh2 Jan 11 11:10:54 host sshd[15544]: Received disconnect from 91.239.206.219 port 52930:11: Bye Bye [preauth] Jan 11 11:10:54 host sshd[15544]: Disconnected from 91.239.206.219 port 52930 [preauth] Jan 11 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 11:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=wwwkmaorg user-15=disposeat user-16=remysagr user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=straightcurve user-22=wwwletsstalkfood user-23=wwwevmhonda user-24=bonifacegroup user-25=mrsclean user-26=wwwnexidigital user-27=phmetals user-28=kottayamcalldriv user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 11:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5cb0Iotpk7KfcXbb.~ Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5cb0Iotpk7KfcXbb.~' Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5cb0Iotpk7KfcXbb.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 11:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 11:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 11:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 11:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 11:28:02 host sshd[18669]: Invalid user cl from 194.110.203.109 port 36578 Jan 11 11:28:02 host sshd[18669]: input_userauth_request: invalid user cl [preauth] Jan 11 11:28:02 host sshd[18669]: pam_unix(sshd:auth): check pass; user unknown Jan 11 11:28:02 host sshd[18669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 11:28:04 host sshd[18669]: Failed password for invalid user cl from 194.110.203.109 port 36578 ssh2 Jan 11 11:28:07 host sshd[18669]: pam_unix(sshd:auth): check pass; user unknown Jan 11 11:28:09 host sshd[18669]: Failed password for invalid user cl from 194.110.203.109 port 36578 ssh2 Jan 11 11:28:12 host sshd[18669]: pam_unix(sshd:auth): check pass; user unknown Jan 11 11:28:14 host sshd[18669]: Failed password for invalid user cl from 194.110.203.109 port 36578 ssh2 Jan 11 11:28:17 host sshd[18669]: Connection closed by 194.110.203.109 port 36578 [preauth] Jan 11 11:28:17 host sshd[18669]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 12:08:54 host sshd[25542]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 11 12:08:54 host sshd[25542]: input_userauth_request: invalid user root [preauth] Jan 11 12:08:54 host unix_chkpwd[25546]: password check failed for user (root) Jan 11 12:08:54 host sshd[25542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 11 12:08:54 host sshd[25542]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 12:08:56 host sshd[25542]: Failed password for invalid user root from 209.141.55.27 port 43470 ssh2 Jan 11 12:08:56 host sshd[25542]: Received disconnect from 209.141.55.27 port 43470:11: Normal Shutdown, Thank you for playing [preauth] Jan 11 12:08:56 host sshd[25542]: Disconnected from 209.141.55.27 port 43470 [preauth] Jan 11 12:11:20 host sshd[25952]: User root from 116.236.200.254 not allowed because not listed in AllowUsers Jan 11 12:11:20 host sshd[25952]: input_userauth_request: invalid user root [preauth] Jan 11 12:11:20 host unix_chkpwd[25961]: password check failed for user (root) Jan 11 12:11:20 host sshd[25952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.200.254 user=root Jan 11 12:11:20 host sshd[25952]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 12:11:22 host sshd[25952]: Failed password for invalid user root from 116.236.200.254 port 54142 ssh2 Jan 11 12:11:22 host sshd[25952]: Received disconnect from 116.236.200.254 port 54142:11: Bye Bye [preauth] Jan 11 12:11:22 host sshd[25952]: Disconnected from 116.236.200.254 port 54142 [preauth] Jan 11 12:13:42 host sshd[26271]: User root from 116.236.200.254 not allowed because not listed in AllowUsers Jan 11 12:13:42 host sshd[26271]: input_userauth_request: invalid user root [preauth] Jan 11 12:13:42 host unix_chkpwd[26274]: password check failed for user (root) Jan 11 12:13:42 host sshd[26271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.200.254 user=root Jan 11 12:13:42 host sshd[26271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 12:13:44 host sshd[26271]: Failed password for invalid user root from 116.236.200.254 port 49712 ssh2 Jan 11 12:13:44 host sshd[26271]: Received disconnect from 116.236.200.254 port 49712:11: Bye Bye [preauth] Jan 11 12:13:44 host sshd[26271]: Disconnected from 116.236.200.254 port 49712 [preauth] Jan 11 12:16:44 host sshd[27364]: Connection closed by 192.155.90.118 port 47300 [preauth] Jan 11 12:16:47 host sshd[27369]: Connection closed by 192.155.90.118 port 47306 [preauth] Jan 11 12:16:49 host sshd[27373]: Connection closed by 192.155.90.118 port 47310 [preauth] Jan 11 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 12:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwrmswll user-5=wwwresourcehunte user-6=keralaholi user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=kottayamcalldriv user-17=phmetals user-18=gifterman user-19=palco123 user-20=wwwnexidigital user-21=mrsclean user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=wwwkapin user-26=woodpeck user-27=wwwtestugo user-28=shalinijames user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 12:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-G3HpHB9KC6LSXqHT.~ Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-G3HpHB9KC6LSXqHT.~' Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-G3HpHB9KC6LSXqHT.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 12:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 12:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 12:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 12:22:20 host sshd[28767]: User root from 79.59.251.230 not allowed because not listed in AllowUsers Jan 11 12:22:20 host sshd[28767]: input_userauth_request: invalid user root [preauth] Jan 11 12:22:20 host unix_chkpwd[28770]: password check failed for user (root) Jan 11 12:22:20 host sshd[28767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.59.251.230 user=root Jan 11 12:22:20 host sshd[28767]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 12:22:22 host sshd[28767]: Failed password for invalid user root from 79.59.251.230 port 59442 ssh2 Jan 11 12:22:22 host sshd[28767]: Received disconnect from 79.59.251.230 port 59442:11: Bye Bye [preauth] Jan 11 12:22:22 host sshd[28767]: Disconnected from 79.59.251.230 port 59442 [preauth] Jan 11 12:27:43 host sshd[29542]: User root from 79.59.251.230 not allowed because not listed in AllowUsers Jan 11 12:27:43 host sshd[29542]: input_userauth_request: invalid user root [preauth] Jan 11 12:27:43 host unix_chkpwd[29551]: password check failed for user (root) Jan 11 12:27:43 host sshd[29542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.59.251.230 user=root Jan 11 12:27:43 host sshd[29542]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 12:27:45 host sshd[29542]: Failed password for invalid user root from 79.59.251.230 port 52194 ssh2 Jan 11 12:36:57 host sshd[31185]: Invalid user bobby from 107.189.30.59 port 57636 Jan 11 12:36:57 host sshd[31185]: input_userauth_request: invalid user bobby [preauth] Jan 11 12:36:57 host sshd[31185]: pam_unix(sshd:auth): check pass; user unknown Jan 11 12:36:57 host sshd[31185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 11 12:36:59 host sshd[31185]: Failed password for invalid user bobby from 107.189.30.59 port 57636 ssh2 Jan 11 12:37:00 host sshd[31185]: Connection closed by 107.189.30.59 port 57636 [preauth] Jan 11 13:08:14 host sshd[6257]: ssh_dispatch_run_fatal: Connection from 207.229.167.36 port 36396: Connection corrupted [preauth] Jan 11 13:16:44 host sshd[8051]: Connection closed by 194.180.48.37 port 32942 [preauth] Jan 11 13:20:04 host sshd[8707]: User root from 94.182.227.17 not allowed because not listed in AllowUsers Jan 11 13:20:04 host sshd[8707]: input_userauth_request: invalid user root [preauth] Jan 11 13:20:05 host unix_chkpwd[8711]: password check failed for user (root) Jan 11 13:20:05 host sshd[8707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.182.227.17 user=root Jan 11 13:20:05 host sshd[8707]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:20:07 host sshd[8707]: Failed password for invalid user root from 94.182.227.17 port 33298 ssh2 Jan 11 13:20:08 host sshd[8707]: Received disconnect from 94.182.227.17 port 33298:11: Bye Bye [preauth] Jan 11 13:20:08 host sshd[8707]: Disconnected from 94.182.227.17 port 33298 [preauth] Jan 11 13:20:11 host sshd[8722]: User root from 210.114.22.126 not allowed because not listed in AllowUsers Jan 11 13:20:11 host sshd[8722]: input_userauth_request: invalid user root [preauth] Jan 11 13:20:11 host unix_chkpwd[8731]: password check failed for user (root) Jan 11 13:20:11 host sshd[8722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.114.22.126 user=root Jan 11 13:20:11 host sshd[8722]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:20:13 host sshd[8722]: Failed password for invalid user root from 210.114.22.126 port 34432 ssh2 Jan 11 13:20:13 host sshd[8722]: Received disconnect from 210.114.22.126 port 34432:11: Bye Bye [preauth] Jan 11 13:20:13 host sshd[8722]: Disconnected from 210.114.22.126 port 34432 [preauth] Jan 11 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 13:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=wwwevmhonda user-15=bonifacegroup user-16=mrsclean user-17=wwwnexidigital user-18=phmetals user-19=kottayamcalldriv user-20=palco123 user-21=gifterman user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=remysagr user-26=wwwkmaorg user-27=pmcresources user-28=shalinijames user-29=wwwtestugo user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 13:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-icB3owqXscJ9X3s2.~ Jan 11 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-icB3owqXscJ9X3s2.~' Jan 11 13:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-icB3owqXscJ9X3s2.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 13:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 13:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 13:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 13:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 13:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 13:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 13:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 13:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 13:22:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 13:22:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 13:22:38 host sshd[9474]: User root from 159.65.133.50 not allowed because not listed in AllowUsers Jan 11 13:22:38 host sshd[9474]: input_userauth_request: invalid user root [preauth] Jan 11 13:22:38 host unix_chkpwd[9478]: password check failed for user (root) Jan 11 13:22:38 host sshd[9474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.133.50 user=root Jan 11 13:22:38 host sshd[9474]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:22:38 host sshd[9476]: User root from 185.245.94.183 not allowed because not listed in AllowUsers Jan 11 13:22:38 host sshd[9476]: input_userauth_request: invalid user root [preauth] Jan 11 13:22:38 host unix_chkpwd[9480]: password check failed for user (root) Jan 11 13:22:38 host sshd[9476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.245.94.183 user=root Jan 11 13:22:38 host sshd[9476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:22:40 host sshd[9474]: Failed password for invalid user root from 159.65.133.50 port 48568 ssh2 Jan 11 13:22:40 host sshd[9474]: Received disconnect from 159.65.133.50 port 48568:11: Bye Bye [preauth] Jan 11 13:22:40 host sshd[9474]: Disconnected from 159.65.133.50 port 48568 [preauth] Jan 11 13:22:40 host sshd[9476]: Failed password for invalid user root from 185.245.94.183 port 42864 ssh2 Jan 11 13:22:40 host sshd[9476]: Received disconnect from 185.245.94.183 port 42864:11: Bye Bye [preauth] Jan 11 13:22:40 host sshd[9476]: Disconnected from 185.245.94.183 port 42864 [preauth] Jan 11 13:23:29 host sshd[9591]: User root from 201.217.195.226 not allowed because not listed in AllowUsers Jan 11 13:23:29 host sshd[9591]: input_userauth_request: invalid user root [preauth] Jan 11 13:23:29 host unix_chkpwd[9595]: password check failed for user (root) Jan 11 13:23:29 host sshd[9591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.195.226 user=root Jan 11 13:23:29 host sshd[9591]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:23:31 host sshd[9591]: Failed password for invalid user root from 201.217.195.226 port 57018 ssh2 Jan 11 13:23:31 host sshd[9591]: Received disconnect from 201.217.195.226 port 57018:11: Bye Bye [preauth] Jan 11 13:23:31 host sshd[9591]: Disconnected from 201.217.195.226 port 57018 [preauth] Jan 11 13:23:55 host sshd[9641]: User root from 195.110.58.161 not allowed because not listed in AllowUsers Jan 11 13:23:55 host sshd[9641]: input_userauth_request: invalid user root [preauth] Jan 11 13:23:55 host unix_chkpwd[9645]: password check failed for user (root) Jan 11 13:23:55 host sshd[9641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.110.58.161 user=root Jan 11 13:23:55 host sshd[9641]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:23:57 host sshd[9641]: Failed password for invalid user root from 195.110.58.161 port 51564 ssh2 Jan 11 13:23:57 host sshd[9641]: Received disconnect from 195.110.58.161 port 51564:11: Bye Bye [preauth] Jan 11 13:23:57 host sshd[9641]: Disconnected from 195.110.58.161 port 51564 [preauth] Jan 11 13:25:06 host sshd[9787]: User root from 139.59.127.73 not allowed because not listed in AllowUsers Jan 11 13:25:06 host sshd[9787]: input_userauth_request: invalid user root [preauth] Jan 11 13:25:06 host unix_chkpwd[9790]: password check failed for user (root) Jan 11 13:25:06 host sshd[9787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.127.73 user=root Jan 11 13:25:06 host sshd[9787]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:25:07 host sshd[9787]: Failed password for invalid user root from 139.59.127.73 port 44848 ssh2 Jan 11 13:25:07 host sshd[9787]: Received disconnect from 139.59.127.73 port 44848:11: Bye Bye [preauth] Jan 11 13:25:07 host sshd[9787]: Disconnected from 139.59.127.73 port 44848 [preauth] Jan 11 13:25:16 host sshd[9805]: User root from 195.110.58.161 not allowed because not listed in AllowUsers Jan 11 13:25:16 host sshd[9805]: input_userauth_request: invalid user root [preauth] Jan 11 13:25:16 host unix_chkpwd[9809]: password check failed for user (root) Jan 11 13:25:16 host sshd[9805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.110.58.161 user=root Jan 11 13:25:16 host sshd[9805]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:25:18 host sshd[9805]: Failed password for invalid user root from 195.110.58.161 port 60806 ssh2 Jan 11 13:25:20 host sshd[9845]: User root from 210.114.22.126 not allowed because not listed in AllowUsers Jan 11 13:25:20 host sshd[9845]: input_userauth_request: invalid user root [preauth] Jan 11 13:25:20 host unix_chkpwd[9849]: password check failed for user (root) Jan 11 13:25:20 host sshd[9845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.114.22.126 user=root Jan 11 13:25:20 host sshd[9845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:25:22 host sshd[9845]: Failed password for invalid user root from 210.114.22.126 port 53430 ssh2 Jan 11 13:25:58 host sshd[9953]: User root from 159.65.133.50 not allowed because not listed in AllowUsers Jan 11 13:25:58 host sshd[9953]: input_userauth_request: invalid user root [preauth] Jan 11 13:25:58 host unix_chkpwd[9956]: password check failed for user (root) Jan 11 13:25:58 host sshd[9953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.133.50 user=root Jan 11 13:25:58 host sshd[9953]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:26:00 host sshd[9953]: Failed password for invalid user root from 159.65.133.50 port 47708 ssh2 Jan 11 13:26:00 host sshd[9953]: Received disconnect from 159.65.133.50 port 47708:11: Bye Bye [preauth] Jan 11 13:26:00 host sshd[9953]: Disconnected from 159.65.133.50 port 47708 [preauth] Jan 11 13:26:13 host sshd[10023]: Invalid user cm from 194.110.203.109 port 53056 Jan 11 13:26:13 host sshd[10023]: input_userauth_request: invalid user cm [preauth] Jan 11 13:26:13 host sshd[10023]: pam_unix(sshd:auth): check pass; user unknown Jan 11 13:26:13 host sshd[10023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 13:26:15 host sshd[10023]: Failed password for invalid user cm from 194.110.203.109 port 53056 ssh2 Jan 11 13:26:17 host sshd[10075]: User root from 185.245.94.183 not allowed because not listed in AllowUsers Jan 11 13:26:17 host sshd[10075]: input_userauth_request: invalid user root [preauth] Jan 11 13:26:17 host unix_chkpwd[10130]: password check failed for user (root) Jan 11 13:26:17 host sshd[10075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.245.94.183 user=root Jan 11 13:26:17 host sshd[10075]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:26:18 host sshd[10023]: pam_unix(sshd:auth): check pass; user unknown Jan 11 13:26:19 host sshd[10075]: Failed password for invalid user root from 185.245.94.183 port 52158 ssh2 Jan 11 13:26:19 host sshd[10075]: Received disconnect from 185.245.94.183 port 52158:11: Bye Bye [preauth] Jan 11 13:26:19 host sshd[10075]: Disconnected from 185.245.94.183 port 52158 [preauth] Jan 11 13:26:20 host sshd[10023]: Failed password for invalid user cm from 194.110.203.109 port 53056 ssh2 Jan 11 13:26:23 host sshd[10023]: pam_unix(sshd:auth): check pass; user unknown Jan 11 13:26:25 host sshd[10023]: Failed password for invalid user cm from 194.110.203.109 port 53056 ssh2 Jan 11 13:26:28 host sshd[10023]: Connection closed by 194.110.203.109 port 53056 [preauth] Jan 11 13:26:28 host sshd[10023]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 13:26:32 host sshd[10195]: User root from 201.217.195.226 not allowed because not listed in AllowUsers Jan 11 13:26:32 host sshd[10195]: input_userauth_request: invalid user root [preauth] Jan 11 13:26:32 host unix_chkpwd[10198]: password check failed for user (root) Jan 11 13:26:32 host sshd[10195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.195.226 user=root Jan 11 13:26:32 host sshd[10195]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:26:35 host sshd[10195]: Failed password for invalid user root from 201.217.195.226 port 34994 ssh2 Jan 11 13:26:35 host sshd[10195]: Received disconnect from 201.217.195.226 port 34994:11: Bye Bye [preauth] Jan 11 13:26:35 host sshd[10195]: Disconnected from 201.217.195.226 port 34994 [preauth] Jan 11 13:27:00 host sshd[10264]: User root from 94.182.227.17 not allowed because not listed in AllowUsers Jan 11 13:27:00 host sshd[10264]: input_userauth_request: invalid user root [preauth] Jan 11 13:27:00 host unix_chkpwd[10267]: password check failed for user (root) Jan 11 13:27:00 host sshd[10264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.182.227.17 user=root Jan 11 13:27:00 host sshd[10264]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:27:02 host sshd[10264]: Failed password for invalid user root from 94.182.227.17 port 35374 ssh2 Jan 11 13:27:02 host sshd[10264]: Received disconnect from 94.182.227.17 port 35374:11: Bye Bye [preauth] Jan 11 13:27:02 host sshd[10264]: Disconnected from 94.182.227.17 port 35374 [preauth] Jan 11 13:27:08 host sshd[10316]: User root from 139.59.127.73 not allowed because not listed in AllowUsers Jan 11 13:27:08 host sshd[10316]: input_userauth_request: invalid user root [preauth] Jan 11 13:27:08 host unix_chkpwd[10320]: password check failed for user (root) Jan 11 13:27:08 host sshd[10316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.127.73 user=root Jan 11 13:27:08 host sshd[10316]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 13:27:10 host sshd[10316]: Failed password for invalid user root from 139.59.127.73 port 43270 ssh2 Jan 11 13:27:10 host sshd[10316]: Received disconnect from 139.59.127.73 port 43270:11: Bye Bye [preauth] Jan 11 13:27:10 host sshd[10316]: Disconnected from 139.59.127.73 port 43270 [preauth] Jan 11 13:31:05 host sshd[10848]: Did not receive identification string from 36.136.57.130 port 60490 Jan 11 13:31:42 host sshd[10853]: Invalid user bitrix from 36.136.57.130 port 32894 Jan 11 13:31:42 host sshd[10853]: input_userauth_request: invalid user bitrix [preauth] Jan 11 13:31:43 host sshd[10853]: pam_unix(sshd:auth): check pass; user unknown Jan 11 13:31:43 host sshd[10853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.136.57.130 Jan 11 13:31:45 host sshd[10853]: Failed password for invalid user bitrix from 36.136.57.130 port 32894 ssh2 Jan 11 13:31:45 host sshd[10853]: Connection closed by 36.136.57.130 port 32894 [preauth] Jan 11 13:54:03 host sshd[14377]: Did not receive identification string from 92.255.85.115 port 1377 Jan 11 14:06:49 host sshd[16044]: User root from 110.35.173.2 not allowed because not listed in AllowUsers Jan 11 14:06:49 host sshd[16044]: input_userauth_request: invalid user root [preauth] Jan 11 14:06:49 host unix_chkpwd[16049]: password check failed for user (root) Jan 11 14:06:49 host sshd[16044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2 user=root Jan 11 14:06:49 host sshd[16044]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:06:51 host sshd[16044]: Failed password for invalid user root from 110.35.173.2 port 29685 ssh2 Jan 11 14:06:52 host sshd[16044]: Received disconnect from 110.35.173.2 port 29685:11: Bye Bye [preauth] Jan 11 14:06:52 host sshd[16044]: Disconnected from 110.35.173.2 port 29685 [preauth] Jan 11 14:07:13 host sshd[16089]: User root from 31.210.39.187 not allowed because not listed in AllowUsers Jan 11 14:07:13 host sshd[16089]: input_userauth_request: invalid user root [preauth] Jan 11 14:07:13 host unix_chkpwd[16092]: password check failed for user (root) Jan 11 14:07:13 host sshd[16089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.39.187 user=root Jan 11 14:07:13 host sshd[16089]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:07:16 host sshd[16089]: Failed password for invalid user root from 31.210.39.187 port 45798 ssh2 Jan 11 14:07:16 host sshd[16089]: Received disconnect from 31.210.39.187 port 45798:11: Bye Bye [preauth] Jan 11 14:07:16 host sshd[16089]: Disconnected from 31.210.39.187 port 45798 [preauth] Jan 11 14:07:21 host sshd[16098]: User root from 137.184.148.244 not allowed because not listed in AllowUsers Jan 11 14:07:21 host sshd[16098]: input_userauth_request: invalid user root [preauth] Jan 11 14:07:21 host unix_chkpwd[16101]: password check failed for user (root) Jan 11 14:07:21 host sshd[16098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.148.244 user=root Jan 11 14:07:21 host sshd[16098]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:07:23 host sshd[16098]: Failed password for invalid user root from 137.184.148.244 port 46892 ssh2 Jan 11 14:07:23 host sshd[16098]: Received disconnect from 137.184.148.244 port 46892:11: Bye Bye [preauth] Jan 11 14:07:23 host sshd[16098]: Disconnected from 137.184.148.244 port 46892 [preauth] Jan 11 14:08:04 host sshd[16180]: User root from 20.228.150.123 not allowed because not listed in AllowUsers Jan 11 14:08:04 host sshd[16180]: input_userauth_request: invalid user root [preauth] Jan 11 14:08:04 host unix_chkpwd[16183]: password check failed for user (root) Jan 11 14:08:04 host sshd[16180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.228.150.123 user=root Jan 11 14:08:04 host sshd[16180]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:08:06 host sshd[16180]: Failed password for invalid user root from 20.228.150.123 port 55466 ssh2 Jan 11 14:08:06 host sshd[16180]: Received disconnect from 20.228.150.123 port 55466:11: Bye Bye [preauth] Jan 11 14:08:06 host sshd[16180]: Disconnected from 20.228.150.123 port 55466 [preauth] Jan 11 14:08:58 host sshd[16272]: User root from 188.254.0.218 not allowed because not listed in AllowUsers Jan 11 14:08:58 host sshd[16272]: input_userauth_request: invalid user root [preauth] Jan 11 14:08:58 host unix_chkpwd[16275]: password check failed for user (root) Jan 11 14:08:58 host sshd[16272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.218 user=root Jan 11 14:08:58 host sshd[16272]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:09:00 host sshd[16272]: Failed password for invalid user root from 188.254.0.218 port 45672 ssh2 Jan 11 14:09:00 host sshd[16272]: Received disconnect from 188.254.0.218 port 45672:11: Bye Bye [preauth] Jan 11 14:09:00 host sshd[16272]: Disconnected from 188.254.0.218 port 45672 [preauth] Jan 11 14:10:41 host sshd[16508]: User root from 217.160.9.187 not allowed because not listed in AllowUsers Jan 11 14:10:41 host sshd[16508]: input_userauth_request: invalid user root [preauth] Jan 11 14:10:41 host unix_chkpwd[16511]: password check failed for user (root) Jan 11 14:10:41 host sshd[16508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.9.187 user=root Jan 11 14:10:41 host sshd[16508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:10:43 host sshd[16508]: Failed password for invalid user root from 217.160.9.187 port 47706 ssh2 Jan 11 14:10:43 host sshd[16508]: Received disconnect from 217.160.9.187 port 47706:11: Bye Bye [preauth] Jan 11 14:10:43 host sshd[16508]: Disconnected from 217.160.9.187 port 47706 [preauth] Jan 11 14:11:22 host sshd[16582]: User root from 138.197.80.24 not allowed because not listed in AllowUsers Jan 11 14:11:22 host sshd[16582]: input_userauth_request: invalid user root [preauth] Jan 11 14:11:22 host unix_chkpwd[16587]: password check failed for user (root) Jan 11 14:11:22 host sshd[16582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.80.24 user=root Jan 11 14:11:22 host sshd[16582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:11:25 host sshd[16590]: User root from 185.54.178.117 not allowed because not listed in AllowUsers Jan 11 14:11:25 host sshd[16590]: input_userauth_request: invalid user root [preauth] Jan 11 14:11:25 host unix_chkpwd[16595]: password check failed for user (root) Jan 11 14:11:25 host sshd[16590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.54.178.117 user=root Jan 11 14:11:25 host sshd[16590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:11:25 host sshd[16582]: Failed password for invalid user root from 138.197.80.24 port 56468 ssh2 Jan 11 14:11:25 host sshd[16582]: Received disconnect from 138.197.80.24 port 56468:11: Bye Bye [preauth] Jan 11 14:11:25 host sshd[16582]: Disconnected from 138.197.80.24 port 56468 [preauth] Jan 11 14:11:26 host sshd[16590]: Failed password for invalid user root from 185.54.178.117 port 41058 ssh2 Jan 11 14:11:27 host sshd[16590]: Received disconnect from 185.54.178.117 port 41058:11: Bye Bye [preauth] Jan 11 14:11:27 host sshd[16590]: Disconnected from 185.54.178.117 port 41058 [preauth] Jan 11 14:11:38 host sshd[16629]: User root from 24.116.119.220 not allowed because not listed in AllowUsers Jan 11 14:11:38 host sshd[16629]: input_userauth_request: invalid user root [preauth] Jan 11 14:11:38 host unix_chkpwd[16633]: password check failed for user (root) Jan 11 14:11:38 host sshd[16629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.116.119.220 user=root Jan 11 14:11:38 host sshd[16629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:11:40 host sshd[16629]: Failed password for invalid user root from 24.116.119.220 port 56830 ssh2 Jan 11 14:11:40 host sshd[16629]: Received disconnect from 24.116.119.220 port 56830:11: Bye Bye [preauth] Jan 11 14:11:40 host sshd[16629]: Disconnected from 24.116.119.220 port 56830 [preauth] Jan 11 14:12:02 host sshd[16775]: User root from 45.184.71.175 not allowed because not listed in AllowUsers Jan 11 14:12:02 host sshd[16775]: input_userauth_request: invalid user root [preauth] Jan 11 14:12:02 host unix_chkpwd[16793]: password check failed for user (root) Jan 11 14:12:02 host sshd[16775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.71.175 user=root Jan 11 14:12:02 host sshd[16775]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:12:04 host sshd[16775]: Failed password for invalid user root from 45.184.71.175 port 35421 ssh2 Jan 11 14:12:04 host sshd[16775]: Received disconnect from 45.184.71.175 port 35421:11: Bye Bye [preauth] Jan 11 14:12:04 host sshd[16775]: Disconnected from 45.184.71.175 port 35421 [preauth] Jan 11 14:12:22 host sshd[16829]: User root from 31.210.39.187 not allowed because not listed in AllowUsers Jan 11 14:12:22 host sshd[16829]: input_userauth_request: invalid user root [preauth] Jan 11 14:12:22 host unix_chkpwd[16833]: password check failed for user (root) Jan 11 14:12:22 host sshd[16829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.39.187 user=root Jan 11 14:12:22 host sshd[16829]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:12:24 host sshd[16829]: Failed password for invalid user root from 31.210.39.187 port 37896 ssh2 Jan 11 14:12:48 host sshd[16918]: User root from 188.254.0.218 not allowed because not listed in AllowUsers Jan 11 14:12:48 host sshd[16918]: input_userauth_request: invalid user root [preauth] Jan 11 14:12:48 host unix_chkpwd[16922]: password check failed for user (root) Jan 11 14:12:48 host sshd[16918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.218 user=root Jan 11 14:12:48 host sshd[16918]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:12:50 host sshd[16918]: Failed password for invalid user root from 188.254.0.218 port 34092 ssh2 Jan 11 14:12:50 host sshd[16918]: Received disconnect from 188.254.0.218 port 34092:11: Bye Bye [preauth] Jan 11 14:12:50 host sshd[16918]: Disconnected from 188.254.0.218 port 34092 [preauth] Jan 11 14:13:03 host sshd[16994]: User root from 210.56.25.101 not allowed because not listed in AllowUsers Jan 11 14:13:03 host sshd[16994]: input_userauth_request: invalid user root [preauth] Jan 11 14:13:03 host unix_chkpwd[16998]: password check failed for user (root) Jan 11 14:13:03 host sshd[16994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.25.101 user=root Jan 11 14:13:03 host sshd[16994]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:13:06 host sshd[16994]: Failed password for invalid user root from 210.56.25.101 port 54980 ssh2 Jan 11 14:13:06 host sshd[16994]: Received disconnect from 210.56.25.101 port 54980:11: Bye Bye [preauth] Jan 11 14:13:06 host sshd[16994]: Disconnected from 210.56.25.101 port 54980 [preauth] Jan 11 14:13:19 host sshd[17022]: User root from 211.254.215.197 not allowed because not listed in AllowUsers Jan 11 14:13:19 host sshd[17022]: input_userauth_request: invalid user root [preauth] Jan 11 14:13:19 host unix_chkpwd[17025]: password check failed for user (root) Jan 11 14:13:19 host sshd[17022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.215.197 user=root Jan 11 14:13:19 host sshd[17022]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:13:21 host sshd[17022]: Failed password for invalid user root from 211.254.215.197 port 38004 ssh2 Jan 11 14:13:21 host sshd[17022]: Received disconnect from 211.254.215.197 port 38004:11: Bye Bye [preauth] Jan 11 14:13:21 host sshd[17022]: Disconnected from 211.254.215.197 port 38004 [preauth] Jan 11 14:13:25 host sshd[17031]: User root from 196.219.43.242 not allowed because not listed in AllowUsers Jan 11 14:13:25 host sshd[17031]: input_userauth_request: invalid user root [preauth] Jan 11 14:13:25 host unix_chkpwd[17035]: password check failed for user (root) Jan 11 14:13:25 host sshd[17031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.219.43.242 user=root Jan 11 14:13:25 host sshd[17031]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:13:27 host sshd[17031]: Failed password for invalid user root from 196.219.43.242 port 54202 ssh2 Jan 11 14:13:27 host sshd[17031]: Received disconnect from 196.219.43.242 port 54202:11: Bye Bye [preauth] Jan 11 14:13:27 host sshd[17031]: Disconnected from 196.219.43.242 port 54202 [preauth] Jan 11 14:14:11 host sshd[17167]: User root from 217.160.9.187 not allowed because not listed in AllowUsers Jan 11 14:14:11 host sshd[17167]: input_userauth_request: invalid user root [preauth] Jan 11 14:14:11 host unix_chkpwd[17173]: password check failed for user (root) Jan 11 14:14:11 host sshd[17167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.9.187 user=root Jan 11 14:14:11 host sshd[17167]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:14:14 host sshd[17167]: Failed password for invalid user root from 217.160.9.187 port 58292 ssh2 Jan 11 14:14:19 host sshd[17222]: User root from 206.189.114.103 not allowed because not listed in AllowUsers Jan 11 14:14:19 host sshd[17222]: input_userauth_request: invalid user root [preauth] Jan 11 14:14:19 host unix_chkpwd[17227]: password check failed for user (root) Jan 11 14:14:19 host sshd[17222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.114.103 user=root Jan 11 14:14:19 host sshd[17222]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:14:20 host sshd[17225]: User root from 137.184.148.244 not allowed because not listed in AllowUsers Jan 11 14:14:20 host sshd[17225]: input_userauth_request: invalid user root [preauth] Jan 11 14:14:20 host unix_chkpwd[17229]: password check failed for user (root) Jan 11 14:14:20 host sshd[17225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.148.244 user=root Jan 11 14:14:20 host sshd[17225]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:14:20 host sshd[17222]: Failed password for invalid user root from 206.189.114.103 port 39800 ssh2 Jan 11 14:14:21 host sshd[17222]: Received disconnect from 206.189.114.103 port 39800:11: Bye Bye [preauth] Jan 11 14:14:21 host sshd[17222]: Disconnected from 206.189.114.103 port 39800 [preauth] Jan 11 14:14:21 host sshd[17225]: Failed password for invalid user root from 137.184.148.244 port 43436 ssh2 Jan 11 14:14:22 host sshd[17225]: Received disconnect from 137.184.148.244 port 43436:11: Bye Bye [preauth] Jan 11 14:14:22 host sshd[17225]: Disconnected from 137.184.148.244 port 43436 [preauth] Jan 11 14:14:38 host sshd[17306]: User root from 20.228.150.123 not allowed because not listed in AllowUsers Jan 11 14:14:38 host sshd[17306]: input_userauth_request: invalid user root [preauth] Jan 11 14:14:38 host unix_chkpwd[17309]: password check failed for user (root) Jan 11 14:14:38 host sshd[17306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.228.150.123 user=root Jan 11 14:14:38 host sshd[17306]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:14:39 host sshd[17306]: Failed password for invalid user root from 20.228.150.123 port 55702 ssh2 Jan 11 14:14:40 host sshd[17306]: Received disconnect from 20.228.150.123 port 55702:11: Bye Bye [preauth] Jan 11 14:14:40 host sshd[17306]: Disconnected from 20.228.150.123 port 55702 [preauth] Jan 11 14:15:13 host sshd[17447]: User root from 146.56.150.128 not allowed because not listed in AllowUsers Jan 11 14:15:13 host sshd[17447]: input_userauth_request: invalid user root [preauth] Jan 11 14:15:13 host unix_chkpwd[17456]: password check failed for user (root) Jan 11 14:15:13 host sshd[17447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.56.150.128 user=root Jan 11 14:15:13 host sshd[17447]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:15:13 host sshd[17444]: User root from 185.54.178.117 not allowed because not listed in AllowUsers Jan 11 14:15:13 host sshd[17444]: input_userauth_request: invalid user root [preauth] Jan 11 14:15:14 host unix_chkpwd[17457]: password check failed for user (root) Jan 11 14:15:14 host sshd[17444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.54.178.117 user=root Jan 11 14:15:14 host sshd[17444]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:15:15 host sshd[17447]: Failed password for invalid user root from 146.56.150.128 port 55486 ssh2 Jan 11 14:15:15 host sshd[17447]: Received disconnect from 146.56.150.128 port 55486:11: Bye Bye [preauth] Jan 11 14:15:15 host sshd[17447]: Disconnected from 146.56.150.128 port 55486 [preauth] Jan 11 14:15:16 host sshd[17444]: Failed password for invalid user root from 185.54.178.117 port 58093 ssh2 Jan 11 14:15:16 host sshd[17444]: Received disconnect from 185.54.178.117 port 58093:11: Bye Bye [preauth] Jan 11 14:15:16 host sshd[17444]: Disconnected from 185.54.178.117 port 58093 [preauth] Jan 11 14:15:31 host sshd[17530]: User root from 43.156.97.145 not allowed because not listed in AllowUsers Jan 11 14:15:31 host sshd[17530]: input_userauth_request: invalid user root [preauth] Jan 11 14:15:31 host unix_chkpwd[17532]: password check failed for user (root) Jan 11 14:15:31 host sshd[17530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.97.145 user=root Jan 11 14:15:31 host sshd[17530]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:15:33 host sshd[17530]: Failed password for invalid user root from 43.156.97.145 port 4618 ssh2 Jan 11 14:15:33 host sshd[17530]: Received disconnect from 43.156.97.145 port 4618:11: Bye Bye [preauth] Jan 11 14:15:33 host sshd[17530]: Disconnected from 43.156.97.145 port 4618 [preauth] Jan 11 14:15:59 host sshd[17570]: User root from 201.52.64.100 not allowed because not listed in AllowUsers Jan 11 14:15:59 host sshd[17570]: input_userauth_request: invalid user root [preauth] Jan 11 14:15:59 host unix_chkpwd[17574]: password check failed for user (root) Jan 11 14:15:59 host sshd[17570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.52.64.100 user=root Jan 11 14:15:59 host sshd[17570]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:15:59 host sshd[17568]: User root from 196.219.43.242 not allowed because not listed in AllowUsers Jan 11 14:15:59 host sshd[17568]: input_userauth_request: invalid user root [preauth] Jan 11 14:15:59 host unix_chkpwd[17575]: password check failed for user (root) Jan 11 14:15:59 host sshd[17568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.219.43.242 user=root Jan 11 14:15:59 host sshd[17568]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:16:01 host sshd[17570]: Failed password for invalid user root from 201.52.64.100 port 51052 ssh2 Jan 11 14:16:01 host sshd[17568]: Failed password for invalid user root from 196.219.43.242 port 50902 ssh2 Jan 11 14:16:01 host sshd[17570]: Received disconnect from 201.52.64.100 port 51052:11: Bye Bye [preauth] Jan 11 14:16:01 host sshd[17570]: Disconnected from 201.52.64.100 port 51052 [preauth] Jan 11 14:16:02 host sshd[17568]: Received disconnect from 196.219.43.242 port 50902:11: Bye Bye [preauth] Jan 11 14:16:02 host sshd[17568]: Disconnected from 196.219.43.242 port 50902 [preauth] Jan 11 14:16:54 host sshd[17731]: User root from 203.23.199.88 not allowed because not listed in AllowUsers Jan 11 14:16:54 host sshd[17731]: input_userauth_request: invalid user root [preauth] Jan 11 14:16:54 host unix_chkpwd[17734]: password check failed for user (root) Jan 11 14:16:54 host sshd[17731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.23.199.88 user=root Jan 11 14:16:54 host sshd[17731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:16:56 host sshd[17731]: Failed password for invalid user root from 203.23.199.88 port 45414 ssh2 Jan 11 14:16:57 host sshd[17731]: Received disconnect from 203.23.199.88 port 45414:11: Bye Bye [preauth] Jan 11 14:16:57 host sshd[17731]: Disconnected from 203.23.199.88 port 45414 [preauth] Jan 11 14:16:58 host sshd[17737]: User root from 167.71.77.9 not allowed because not listed in AllowUsers Jan 11 14:16:58 host sshd[17737]: input_userauth_request: invalid user root [preauth] Jan 11 14:16:58 host unix_chkpwd[17741]: password check failed for user (root) Jan 11 14:16:58 host sshd[17737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.77.9 user=root Jan 11 14:16:58 host sshd[17737]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:17:00 host sshd[17737]: Failed password for invalid user root from 167.71.77.9 port 50368 ssh2 Jan 11 14:17:00 host sshd[17737]: Received disconnect from 167.71.77.9 port 50368:11: Bye Bye [preauth] Jan 11 14:17:00 host sshd[17737]: Disconnected from 167.71.77.9 port 50368 [preauth] Jan 11 14:17:00 host sshd[17743]: User root from 138.197.80.24 not allowed because not listed in AllowUsers Jan 11 14:17:00 host sshd[17743]: input_userauth_request: invalid user root [preauth] Jan 11 14:17:00 host unix_chkpwd[17746]: password check failed for user (root) Jan 11 14:17:00 host sshd[17743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.80.24 user=root Jan 11 14:17:00 host sshd[17743]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:17:03 host sshd[17743]: Failed password for invalid user root from 138.197.80.24 port 36244 ssh2 Jan 11 14:17:03 host sshd[17743]: Received disconnect from 138.197.80.24 port 36244:11: Bye Bye [preauth] Jan 11 14:17:03 host sshd[17743]: Disconnected from 138.197.80.24 port 36244 [preauth] Jan 11 14:17:35 host sshd[17945]: User root from 24.116.119.220 not allowed because not listed in AllowUsers Jan 11 14:17:35 host sshd[17945]: input_userauth_request: invalid user root [preauth] Jan 11 14:17:35 host unix_chkpwd[17948]: password check failed for user (root) Jan 11 14:17:35 host sshd[17945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.116.119.220 user=root Jan 11 14:17:35 host sshd[17945]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:17:37 host sshd[17945]: Failed password for invalid user root from 24.116.119.220 port 44772 ssh2 Jan 11 14:17:38 host sshd[17945]: Received disconnect from 24.116.119.220 port 44772:11: Bye Bye [preauth] Jan 11 14:17:38 host sshd[17945]: Disconnected from 24.116.119.220 port 44772 [preauth] Jan 11 14:18:14 host sshd[18027]: User root from 45.184.71.175 not allowed because not listed in AllowUsers Jan 11 14:18:14 host sshd[18027]: input_userauth_request: invalid user root [preauth] Jan 11 14:18:14 host unix_chkpwd[18043]: password check failed for user (root) Jan 11 14:18:14 host sshd[18027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.71.175 user=root Jan 11 14:18:14 host sshd[18027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:18:16 host sshd[18027]: Failed password for invalid user root from 45.184.71.175 port 9028 ssh2 Jan 11 14:18:17 host sshd[18027]: Received disconnect from 45.184.71.175 port 9028:11: Bye Bye [preauth] Jan 11 14:18:17 host sshd[18027]: Disconnected from 45.184.71.175 port 9028 [preauth] Jan 11 14:18:30 host sshd[18110]: User root from 43.156.97.145 not allowed because not listed in AllowUsers Jan 11 14:18:30 host sshd[18110]: input_userauth_request: invalid user root [preauth] Jan 11 14:18:30 host unix_chkpwd[18112]: password check failed for user (root) Jan 11 14:18:30 host sshd[18110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.97.145 user=root Jan 11 14:18:30 host sshd[18110]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:18:32 host sshd[18113]: User root from 206.189.114.103 not allowed because not listed in AllowUsers Jan 11 14:18:32 host sshd[18113]: input_userauth_request: invalid user root [preauth] Jan 11 14:18:32 host unix_chkpwd[18116]: password check failed for user (root) Jan 11 14:18:32 host sshd[18113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.114.103 user=root Jan 11 14:18:32 host sshd[18113]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:18:32 host sshd[18110]: Failed password for invalid user root from 43.156.97.145 port 60462 ssh2 Jan 11 14:18:32 host sshd[18110]: Received disconnect from 43.156.97.145 port 60462:11: Bye Bye [preauth] Jan 11 14:18:32 host sshd[18110]: Disconnected from 43.156.97.145 port 60462 [preauth] Jan 11 14:18:33 host sshd[18113]: Failed password for invalid user root from 206.189.114.103 port 55094 ssh2 Jan 11 14:18:40 host sshd[18186]: User root from 211.254.215.197 not allowed because not listed in AllowUsers Jan 11 14:18:40 host sshd[18186]: input_userauth_request: invalid user root [preauth] Jan 11 14:18:40 host unix_chkpwd[18189]: password check failed for user (root) Jan 11 14:18:40 host sshd[18186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.215.197 user=root Jan 11 14:18:40 host sshd[18186]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:18:42 host sshd[18186]: Failed password for invalid user root from 211.254.215.197 port 59854 ssh2 Jan 11 14:18:42 host sshd[18186]: Received disconnect from 211.254.215.197 port 59854:11: Bye Bye [preauth] Jan 11 14:18:42 host sshd[18186]: Disconnected from 211.254.215.197 port 59854 [preauth] Jan 11 14:18:42 host sshd[18190]: User root from 210.56.25.101 not allowed because not listed in AllowUsers Jan 11 14:18:42 host sshd[18190]: input_userauth_request: invalid user root [preauth] Jan 11 14:18:42 host unix_chkpwd[18194]: password check failed for user (root) Jan 11 14:18:42 host sshd[18190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.56.25.101 user=root Jan 11 14:18:42 host sshd[18190]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:18:44 host sshd[18190]: Failed password for invalid user root from 210.56.25.101 port 50070 ssh2 Jan 11 14:18:44 host sshd[18256]: User root from 203.23.199.88 not allowed because not listed in AllowUsers Jan 11 14:18:44 host sshd[18256]: input_userauth_request: invalid user root [preauth] Jan 11 14:18:44 host unix_chkpwd[18260]: password check failed for user (root) Jan 11 14:18:44 host sshd[18256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.23.199.88 user=root Jan 11 14:18:44 host sshd[18256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:18:46 host sshd[18256]: Failed password for invalid user root from 203.23.199.88 port 60659 ssh2 Jan 11 14:18:46 host sshd[18256]: Received disconnect from 203.23.199.88 port 60659:11: Bye Bye [preauth] Jan 11 14:18:46 host sshd[18256]: Disconnected from 203.23.199.88 port 60659 [preauth] Jan 11 14:19:35 host sshd[18386]: User root from 167.71.77.9 not allowed because not listed in AllowUsers Jan 11 14:19:35 host sshd[18386]: input_userauth_request: invalid user root [preauth] Jan 11 14:19:35 host unix_chkpwd[18389]: password check failed for user (root) Jan 11 14:19:35 host sshd[18386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.77.9 user=root Jan 11 14:19:35 host sshd[18386]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:19:37 host sshd[18386]: Failed password for invalid user root from 167.71.77.9 port 44046 ssh2 Jan 11 14:19:37 host sshd[18386]: Received disconnect from 167.71.77.9 port 44046:11: Bye Bye [preauth] Jan 11 14:19:37 host sshd[18386]: Disconnected from 167.71.77.9 port 44046 [preauth] Jan 11 14:19:49 host sshd[18435]: Invalid user bzrx1098ui from 92.255.85.115 port 64859 Jan 11 14:19:49 host sshd[18435]: input_userauth_request: invalid user bzrx1098ui [preauth] Jan 11 14:19:49 host sshd[18435]: pam_unix(sshd:auth): check pass; user unknown Jan 11 14:19:49 host sshd[18435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 11 14:19:51 host sshd[18435]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 64859 ssh2 Jan 11 14:19:51 host sshd[18435]: Connection reset by 92.255.85.115 port 64859 [preauth] Jan 11 14:20:06 host sshd[18490]: User root from 201.52.64.100 not allowed because not listed in AllowUsers Jan 11 14:20:06 host sshd[18490]: input_userauth_request: invalid user root [preauth] Jan 11 14:20:06 host unix_chkpwd[18493]: password check failed for user (root) Jan 11 14:20:06 host sshd[18490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.52.64.100 user=root Jan 11 14:20:06 host sshd[18490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:20:08 host sshd[18490]: Failed password for invalid user root from 201.52.64.100 port 60026 ssh2 Jan 11 14:20:45 host sshd[18608]: User root from 146.56.150.128 not allowed because not listed in AllowUsers Jan 11 14:20:45 host sshd[18608]: input_userauth_request: invalid user root [preauth] Jan 11 14:20:45 host unix_chkpwd[18614]: password check failed for user (root) Jan 11 14:20:45 host sshd[18608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.56.150.128 user=root Jan 11 14:20:45 host sshd[18608]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:20:47 host sshd[18608]: Failed password for invalid user root from 146.56.150.128 port 54282 ssh2 Jan 11 14:20:48 host sshd[18608]: Received disconnect from 146.56.150.128 port 54282:11: Bye Bye [preauth] Jan 11 14:20:48 host sshd[18608]: Disconnected from 146.56.150.128 port 54282 [preauth] Jan 11 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 14:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=mrsclean user-15=wwwnexidigital user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 14:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bX9enzrbJQAXMErA.~ Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bX9enzrbJQAXMErA.~' Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bX9enzrbJQAXMErA.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 14:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 14:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 14:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 14:23:26 host sshd[19278]: User root from 203.23.199.89 not allowed because not listed in AllowUsers Jan 11 14:23:26 host sshd[19278]: input_userauth_request: invalid user root [preauth] Jan 11 14:23:26 host unix_chkpwd[19281]: password check failed for user (root) Jan 11 14:23:26 host sshd[19278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.23.199.89 user=root Jan 11 14:23:26 host sshd[19278]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:23:28 host sshd[19278]: Failed password for invalid user root from 203.23.199.89 port 39469 ssh2 Jan 11 14:23:28 host sshd[19278]: Received disconnect from 203.23.199.89 port 39469:11: Bye Bye [preauth] Jan 11 14:23:28 host sshd[19278]: Disconnected from 203.23.199.89 port 39469 [preauth] Jan 11 14:24:09 host sshd[19359]: Did not receive identification string from 149.129.220.222 port 61000 Jan 11 14:24:21 host sshd[19374]: User root from 185.227.154.178 not allowed because not listed in AllowUsers Jan 11 14:24:21 host sshd[19374]: input_userauth_request: invalid user root [preauth] Jan 11 14:24:21 host unix_chkpwd[19379]: password check failed for user (root) Jan 11 14:24:21 host sshd[19374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.227.154.178 user=root Jan 11 14:24:21 host sshd[19374]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:24:22 host sshd[19374]: Failed password for invalid user root from 185.227.154.178 port 41344 ssh2 Jan 11 14:24:22 host sshd[19374]: Received disconnect from 185.227.154.178 port 41344:11: Bye Bye [preauth] Jan 11 14:24:22 host sshd[19374]: Disconnected from 185.227.154.178 port 41344 [preauth] Jan 11 14:26:25 host sshd[19617]: Invalid user admin from 92.255.85.115 port 45561 Jan 11 14:26:25 host sshd[19617]: input_userauth_request: invalid user admin [preauth] Jan 11 14:26:25 host sshd[19617]: pam_unix(sshd:auth): check pass; user unknown Jan 11 14:26:25 host sshd[19617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 11 14:26:27 host sshd[19617]: Failed password for invalid user admin from 92.255.85.115 port 45561 ssh2 Jan 11 14:26:27 host sshd[19617]: Connection reset by 92.255.85.115 port 45561 [preauth] Jan 11 14:26:48 host sshd[19693]: User root from 220.126.8.143 not allowed because not listed in AllowUsers Jan 11 14:26:48 host sshd[19693]: input_userauth_request: invalid user root [preauth] Jan 11 14:26:48 host unix_chkpwd[19696]: password check failed for user (root) Jan 11 14:26:48 host sshd[19693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.126.8.143 user=root Jan 11 14:26:48 host sshd[19693]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:26:50 host sshd[19693]: Failed password for invalid user root from 220.126.8.143 port 47066 ssh2 Jan 11 14:26:50 host sshd[19693]: Received disconnect from 220.126.8.143 port 47066:11: Bye Bye [preauth] Jan 11 14:26:50 host sshd[19693]: Disconnected from 220.126.8.143 port 47066 [preauth] Jan 11 14:27:43 host sshd[19896]: User root from 211.253.133.48 not allowed because not listed in AllowUsers Jan 11 14:27:43 host sshd[19896]: input_userauth_request: invalid user root [preauth] Jan 11 14:27:43 host unix_chkpwd[19899]: password check failed for user (root) Jan 11 14:27:43 host sshd[19896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.133.48 user=root Jan 11 14:27:43 host sshd[19896]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:27:45 host sshd[19896]: Failed password for invalid user root from 211.253.133.48 port 39053 ssh2 Jan 11 14:27:45 host sshd[19896]: Received disconnect from 211.253.133.48 port 39053:11: Bye Bye [preauth] Jan 11 14:27:45 host sshd[19896]: Disconnected from 211.253.133.48 port 39053 [preauth] Jan 11 14:30:22 host sshd[20234]: User root from 220.126.8.143 not allowed because not listed in AllowUsers Jan 11 14:30:22 host sshd[20234]: input_userauth_request: invalid user root [preauth] Jan 11 14:30:22 host unix_chkpwd[20239]: password check failed for user (root) Jan 11 14:30:22 host sshd[20234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.126.8.143 user=root Jan 11 14:30:22 host sshd[20234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:30:23 host sshd[20235]: User root from 185.227.154.178 not allowed because not listed in AllowUsers Jan 11 14:30:23 host sshd[20235]: input_userauth_request: invalid user root [preauth] Jan 11 14:30:23 host unix_chkpwd[20240]: password check failed for user (root) Jan 11 14:30:23 host sshd[20235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.227.154.178 user=root Jan 11 14:30:23 host sshd[20235]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:30:24 host sshd[20234]: Failed password for invalid user root from 220.126.8.143 port 58700 ssh2 Jan 11 14:30:24 host sshd[20235]: Failed password for invalid user root from 185.227.154.178 port 36138 ssh2 Jan 11 14:30:41 host sshd[20344]: User root from 211.253.133.48 not allowed because not listed in AllowUsers Jan 11 14:30:41 host sshd[20344]: input_userauth_request: invalid user root [preauth] Jan 11 14:30:41 host unix_chkpwd[20349]: password check failed for user (root) Jan 11 14:30:41 host sshd[20344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.133.48 user=root Jan 11 14:30:41 host sshd[20344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:30:41 host sshd[20347]: Invalid user patrick from 209.141.56.48 port 56648 Jan 11 14:30:41 host sshd[20347]: input_userauth_request: invalid user patrick [preauth] Jan 11 14:30:41 host sshd[20347]: pam_unix(sshd:auth): check pass; user unknown Jan 11 14:30:41 host sshd[20347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 11 14:30:43 host sshd[20344]: Failed password for invalid user root from 211.253.133.48 port 56077 ssh2 Jan 11 14:30:43 host sshd[20344]: Received disconnect from 211.253.133.48 port 56077:11: Bye Bye [preauth] Jan 11 14:30:43 host sshd[20344]: Disconnected from 211.253.133.48 port 56077 [preauth] Jan 11 14:30:44 host sshd[20347]: Failed password for invalid user patrick from 209.141.56.48 port 56648 ssh2 Jan 11 14:30:44 host sshd[20347]: Connection closed by 209.141.56.48 port 56648 [preauth] Jan 11 14:31:09 host sshd[20428]: User root from 128.199.233.192 not allowed because not listed in AllowUsers Jan 11 14:31:09 host sshd[20428]: input_userauth_request: invalid user root [preauth] Jan 11 14:31:09 host unix_chkpwd[20430]: password check failed for user (root) Jan 11 14:31:09 host sshd[20428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.233.192 user=root Jan 11 14:31:09 host sshd[20428]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:31:11 host sshd[20428]: Failed password for invalid user root from 128.199.233.192 port 60092 ssh2 Jan 11 14:31:11 host sshd[20428]: Received disconnect from 128.199.233.192 port 60092:11: Bye Bye [preauth] Jan 11 14:31:11 host sshd[20428]: Disconnected from 128.199.233.192 port 60092 [preauth] Jan 11 14:31:59 host sshd[20526]: User root from 128.199.233.192 not allowed because not listed in AllowUsers Jan 11 14:31:59 host sshd[20526]: input_userauth_request: invalid user root [preauth] Jan 11 14:31:59 host unix_chkpwd[20528]: password check failed for user (root) Jan 11 14:31:59 host sshd[20526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.233.192 user=root Jan 11 14:31:59 host sshd[20526]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:32:01 host sshd[20526]: Failed password for invalid user root from 128.199.233.192 port 39904 ssh2 Jan 11 14:32:01 host sshd[20526]: Received disconnect from 128.199.233.192 port 39904:11: Bye Bye [preauth] Jan 11 14:32:01 host sshd[20526]: Disconnected from 128.199.233.192 port 39904 [preauth] Jan 11 14:35:16 host sshd[21093]: Did not receive identification string from 58.72.18.130 port 40750 Jan 11 14:40:10 host sshd[21603]: User root from 138.2.140.158 not allowed because not listed in AllowUsers Jan 11 14:40:10 host sshd[21603]: input_userauth_request: invalid user root [preauth] Jan 11 14:40:11 host unix_chkpwd[21606]: password check failed for user (root) Jan 11 14:40:11 host sshd[21603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.140.158 user=root Jan 11 14:40:11 host sshd[21603]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:40:13 host sshd[21603]: Failed password for invalid user root from 138.2.140.158 port 37074 ssh2 Jan 11 14:40:13 host sshd[21603]: Received disconnect from 138.2.140.158 port 37074:11: Bye Bye [preauth] Jan 11 14:40:13 host sshd[21603]: Disconnected from 138.2.140.158 port 37074 [preauth] Jan 11 14:41:05 host sshd[21813]: User root from 143.244.189.18 not allowed because not listed in AllowUsers Jan 11 14:41:05 host sshd[21813]: input_userauth_request: invalid user root [preauth] Jan 11 14:41:05 host unix_chkpwd[21820]: password check failed for user (root) Jan 11 14:41:05 host sshd[21813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.189.18 user=root Jan 11 14:41:05 host sshd[21813]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:41:08 host sshd[21813]: Failed password for invalid user root from 143.244.189.18 port 39844 ssh2 Jan 11 14:41:08 host sshd[21813]: Received disconnect from 143.244.189.18 port 39844:11: Bye Bye [preauth] Jan 11 14:41:08 host sshd[21813]: Disconnected from 143.244.189.18 port 39844 [preauth] Jan 11 14:44:12 host sshd[22194]: User root from 138.2.140.158 not allowed because not listed in AllowUsers Jan 11 14:44:12 host sshd[22194]: input_userauth_request: invalid user root [preauth] Jan 11 14:44:12 host unix_chkpwd[22198]: password check failed for user (root) Jan 11 14:44:12 host sshd[22194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.140.158 user=root Jan 11 14:44:12 host sshd[22194]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:44:13 host sshd[22194]: Failed password for invalid user root from 138.2.140.158 port 32940 ssh2 Jan 11 14:44:13 host sshd[22194]: Received disconnect from 138.2.140.158 port 32940:11: Bye Bye [preauth] Jan 11 14:44:13 host sshd[22194]: Disconnected from 138.2.140.158 port 32940 [preauth] Jan 11 14:45:02 host sshd[22335]: User root from 143.244.189.18 not allowed because not listed in AllowUsers Jan 11 14:45:02 host sshd[22335]: input_userauth_request: invalid user root [preauth] Jan 11 14:45:02 host unix_chkpwd[22355]: password check failed for user (root) Jan 11 14:45:02 host sshd[22335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.189.18 user=root Jan 11 14:45:02 host sshd[22335]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:45:04 host sshd[22335]: Failed password for invalid user root from 143.244.189.18 port 55306 ssh2 Jan 11 14:45:04 host sshd[22335]: Received disconnect from 143.244.189.18 port 55306:11: Bye Bye [preauth] Jan 11 14:45:04 host sshd[22335]: Disconnected from 143.244.189.18 port 55306 [preauth] Jan 11 14:54:19 host sshd[23672]: User root from 141.94.76.58 not allowed because not listed in AllowUsers Jan 11 14:54:19 host sshd[23672]: input_userauth_request: invalid user root [preauth] Jan 11 14:54:19 host unix_chkpwd[23675]: password check failed for user (root) Jan 11 14:54:19 host sshd[23672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.94.76.58 user=root Jan 11 14:54:19 host sshd[23672]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:54:21 host sshd[23672]: Failed password for invalid user root from 141.94.76.58 port 43036 ssh2 Jan 11 14:54:22 host sshd[23672]: Received disconnect from 141.94.76.58 port 43036:11: Bye Bye [preauth] Jan 11 14:54:22 host sshd[23672]: Disconnected from 141.94.76.58 port 43036 [preauth] Jan 11 14:55:29 host sshd[23828]: User root from 66.70.185.146 not allowed because not listed in AllowUsers Jan 11 14:55:29 host sshd[23828]: input_userauth_request: invalid user root [preauth] Jan 11 14:55:29 host unix_chkpwd[23831]: password check failed for user (root) Jan 11 14:55:29 host sshd[23828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.185.146 user=root Jan 11 14:55:29 host sshd[23828]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:55:31 host sshd[23828]: Failed password for invalid user root from 66.70.185.146 port 56186 ssh2 Jan 11 14:55:31 host sshd[23828]: Received disconnect from 66.70.185.146 port 56186:11: Bye Bye [preauth] Jan 11 14:55:31 host sshd[23828]: Disconnected from 66.70.185.146 port 56186 [preauth] Jan 11 14:57:04 host sshd[24102]: User root from 44.212.52.214 not allowed because not listed in AllowUsers Jan 11 14:57:04 host sshd[24102]: input_userauth_request: invalid user root [preauth] Jan 11 14:57:04 host unix_chkpwd[24105]: password check failed for user (root) Jan 11 14:57:04 host sshd[24102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.212.52.214 user=root Jan 11 14:57:04 host sshd[24102]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:57:06 host sshd[24102]: Failed password for invalid user root from 44.212.52.214 port 43246 ssh2 Jan 11 14:57:06 host sshd[24102]: Received disconnect from 44.212.52.214 port 43246:11: Bye Bye [preauth] Jan 11 14:57:06 host sshd[24102]: Disconnected from 44.212.52.214 port 43246 [preauth] Jan 11 14:57:07 host sshd[24109]: User root from 165.232.177.245 not allowed because not listed in AllowUsers Jan 11 14:57:07 host sshd[24109]: input_userauth_request: invalid user root [preauth] Jan 11 14:57:07 host unix_chkpwd[24111]: password check failed for user (root) Jan 11 14:57:07 host sshd[24109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.177.245 user=root Jan 11 14:57:07 host sshd[24109]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:57:08 host sshd[24109]: Failed password for invalid user root from 165.232.177.245 port 40976 ssh2 Jan 11 14:57:08 host sshd[24109]: Received disconnect from 165.232.177.245 port 40976:11: Bye Bye [preauth] Jan 11 14:57:08 host sshd[24109]: Disconnected from 165.232.177.245 port 40976 [preauth] Jan 11 14:57:28 host sshd[24162]: User root from 157.230.91.199 not allowed because not listed in AllowUsers Jan 11 14:57:28 host sshd[24162]: input_userauth_request: invalid user root [preauth] Jan 11 14:57:28 host unix_chkpwd[24187]: password check failed for user (root) Jan 11 14:57:28 host sshd[24162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.199 user=root Jan 11 14:57:28 host sshd[24162]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:57:30 host sshd[24162]: Failed password for invalid user root from 157.230.91.199 port 37602 ssh2 Jan 11 14:57:30 host sshd[24162]: Received disconnect from 157.230.91.199 port 37602:11: Bye Bye [preauth] Jan 11 14:57:30 host sshd[24162]: Disconnected from 157.230.91.199 port 37602 [preauth] Jan 11 14:58:05 host sshd[24254]: User root from 118.219.54.135 not allowed because not listed in AllowUsers Jan 11 14:58:05 host sshd[24254]: input_userauth_request: invalid user root [preauth] Jan 11 14:58:05 host unix_chkpwd[24256]: password check failed for user (root) Jan 11 14:58:05 host sshd[24254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.219.54.135 user=root Jan 11 14:58:05 host sshd[24254]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:58:08 host sshd[24254]: Failed password for invalid user root from 118.219.54.135 port 49758 ssh2 Jan 11 14:58:08 host sshd[24254]: Received disconnect from 118.219.54.135 port 49758:11: Bye Bye [preauth] Jan 11 14:58:08 host sshd[24254]: Disconnected from 118.219.54.135 port 49758 [preauth] Jan 11 14:58:36 host sshd[24321]: User root from 149.56.181.231 not allowed because not listed in AllowUsers Jan 11 14:58:36 host sshd[24321]: input_userauth_request: invalid user root [preauth] Jan 11 14:58:36 host unix_chkpwd[24327]: password check failed for user (root) Jan 11 14:58:36 host sshd[24321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.181.231 user=root Jan 11 14:58:36 host sshd[24321]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:58:38 host sshd[24321]: Failed password for invalid user root from 149.56.181.231 port 45254 ssh2 Jan 11 14:58:39 host sshd[24321]: Received disconnect from 149.56.181.231 port 45254:11: Bye Bye [preauth] Jan 11 14:58:39 host sshd[24321]: Disconnected from 149.56.181.231 port 45254 [preauth] Jan 11 14:59:45 host sshd[24444]: User root from 69.49.235.162 not allowed because not listed in AllowUsers Jan 11 14:59:45 host sshd[24444]: input_userauth_request: invalid user root [preauth] Jan 11 14:59:45 host unix_chkpwd[24448]: password check failed for user (root) Jan 11 14:59:45 host sshd[24444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.235.162 user=root Jan 11 14:59:45 host sshd[24444]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 14:59:47 host sshd[24444]: Failed password for invalid user root from 69.49.235.162 port 45026 ssh2 Jan 11 14:59:47 host sshd[24444]: Received disconnect from 69.49.235.162 port 45026:11: Bye Bye [preauth] Jan 11 14:59:47 host sshd[24444]: Disconnected from 69.49.235.162 port 45026 [preauth] Jan 11 15:00:00 host sshd[24470]: User root from 167.71.236.26 not allowed because not listed in AllowUsers Jan 11 15:00:00 host sshd[24470]: input_userauth_request: invalid user root [preauth] Jan 11 15:00:00 host unix_chkpwd[24472]: password check failed for user (root) Jan 11 15:00:00 host sshd[24470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.236.26 user=root Jan 11 15:00:00 host sshd[24470]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:00:02 host sshd[24470]: Failed password for invalid user root from 167.71.236.26 port 57108 ssh2 Jan 11 15:00:02 host sshd[24470]: Received disconnect from 167.71.236.26 port 57108:11: Bye Bye [preauth] Jan 11 15:00:02 host sshd[24470]: Disconnected from 167.71.236.26 port 57108 [preauth] Jan 11 15:00:10 host sshd[24511]: User root from 141.94.76.58 not allowed because not listed in AllowUsers Jan 11 15:00:10 host sshd[24511]: input_userauth_request: invalid user root [preauth] Jan 11 15:00:10 host unix_chkpwd[24515]: password check failed for user (root) Jan 11 15:00:10 host sshd[24511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.94.76.58 user=root Jan 11 15:00:10 host sshd[24511]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:00:12 host sshd[24511]: Failed password for invalid user root from 141.94.76.58 port 45692 ssh2 Jan 11 15:00:12 host sshd[24511]: Received disconnect from 141.94.76.58 port 45692:11: Bye Bye [preauth] Jan 11 15:00:12 host sshd[24511]: Disconnected from 141.94.76.58 port 45692 [preauth] Jan 11 15:00:15 host sshd[24518]: User root from 43.135.154.128 not allowed because not listed in AllowUsers Jan 11 15:00:15 host sshd[24518]: input_userauth_request: invalid user root [preauth] Jan 11 15:00:15 host unix_chkpwd[24545]: password check failed for user (root) Jan 11 15:00:15 host sshd[24518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.154.128 user=root Jan 11 15:00:15 host sshd[24518]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:00:17 host sshd[24518]: Failed password for invalid user root from 43.135.154.128 port 44762 ssh2 Jan 11 15:00:17 host sshd[24518]: Received disconnect from 43.135.154.128 port 44762:11: Bye Bye [preauth] Jan 11 15:00:17 host sshd[24518]: Disconnected from 43.135.154.128 port 44762 [preauth] Jan 11 15:00:18 host sshd[24564]: User root from 43.159.32.228 not allowed because not listed in AllowUsers Jan 11 15:00:18 host sshd[24564]: input_userauth_request: invalid user root [preauth] Jan 11 15:00:18 host unix_chkpwd[24566]: password check failed for user (root) Jan 11 15:00:18 host sshd[24564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.32.228 user=root Jan 11 15:00:18 host sshd[24564]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:00:19 host sshd[24562]: User root from 93.125.114.51 not allowed because not listed in AllowUsers Jan 11 15:00:19 host sshd[24562]: input_userauth_request: invalid user root [preauth] Jan 11 15:00:19 host unix_chkpwd[24568]: password check failed for user (root) Jan 11 15:00:19 host sshd[24562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.125.114.51 user=root Jan 11 15:00:19 host sshd[24562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:00:21 host sshd[24564]: Failed password for invalid user root from 43.159.32.228 port 59946 ssh2 Jan 11 15:00:21 host sshd[24564]: Received disconnect from 43.159.32.228 port 59946:11: Bye Bye [preauth] Jan 11 15:00:21 host sshd[24564]: Disconnected from 43.159.32.228 port 59946 [preauth] Jan 11 15:00:21 host sshd[24562]: Failed password for invalid user root from 93.125.114.51 port 41716 ssh2 Jan 11 15:00:21 host sshd[24562]: Received disconnect from 93.125.114.51 port 41716:11: Bye Bye [preauth] Jan 11 15:00:21 host sshd[24562]: Disconnected from 93.125.114.51 port 41716 [preauth] Jan 11 15:00:23 host sshd[24572]: User root from 50.223.37.170 not allowed because not listed in AllowUsers Jan 11 15:00:23 host sshd[24572]: input_userauth_request: invalid user root [preauth] Jan 11 15:00:23 host unix_chkpwd[24575]: password check failed for user (root) Jan 11 15:00:23 host sshd[24572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.223.37.170 user=root Jan 11 15:00:23 host sshd[24572]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:00:26 host sshd[24572]: Failed password for invalid user root from 50.223.37.170 port 54242 ssh2 Jan 11 15:00:26 host sshd[24572]: Received disconnect from 50.223.37.170 port 54242:11: Bye Bye [preauth] Jan 11 15:00:26 host sshd[24572]: Disconnected from 50.223.37.170 port 54242 [preauth] Jan 11 15:00:29 host sshd[24598]: User root from 167.71.25.186 not allowed because not listed in AllowUsers Jan 11 15:00:29 host sshd[24598]: input_userauth_request: invalid user root [preauth] Jan 11 15:00:29 host unix_chkpwd[24606]: password check failed for user (root) Jan 11 15:00:29 host sshd[24598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.25.186 user=root Jan 11 15:00:29 host sshd[24598]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:00:32 host sshd[24598]: Failed password for invalid user root from 167.71.25.186 port 34658 ssh2 Jan 11 15:00:32 host sshd[24598]: Received disconnect from 167.71.25.186 port 34658:11: Bye Bye [preauth] Jan 11 15:00:32 host sshd[24598]: Disconnected from 167.71.25.186 port 34658 [preauth] Jan 11 15:01:10 host sshd[24676]: User root from 140.238.122.212 not allowed because not listed in AllowUsers Jan 11 15:01:11 host sshd[24676]: input_userauth_request: invalid user root [preauth] Jan 11 15:01:11 host unix_chkpwd[24679]: password check failed for user (root) Jan 11 15:01:11 host sshd[24676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.122.212 user=root Jan 11 15:01:11 host sshd[24676]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:01:13 host sshd[24676]: Failed password for invalid user root from 140.238.122.212 port 51678 ssh2 Jan 11 15:01:13 host sshd[24676]: Received disconnect from 140.238.122.212 port 51678:11: Bye Bye [preauth] Jan 11 15:01:13 host sshd[24676]: Disconnected from 140.238.122.212 port 51678 [preauth] Jan 11 15:01:16 host sshd[24685]: User root from 157.230.91.199 not allowed because not listed in AllowUsers Jan 11 15:01:16 host sshd[24685]: input_userauth_request: invalid user root [preauth] Jan 11 15:01:16 host unix_chkpwd[24697]: password check failed for user (root) Jan 11 15:01:16 host sshd[24685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.199 user=root Jan 11 15:01:16 host sshd[24685]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:01:18 host sshd[24685]: Failed password for invalid user root from 157.230.91.199 port 48628 ssh2 Jan 11 15:01:18 host sshd[24685]: Received disconnect from 157.230.91.199 port 48628:11: Bye Bye [preauth] Jan 11 15:01:18 host sshd[24685]: Disconnected from 157.230.91.199 port 48628 [preauth] Jan 11 15:01:18 host sshd[24698]: User root from 149.56.181.231 not allowed because not listed in AllowUsers Jan 11 15:01:18 host sshd[24698]: input_userauth_request: invalid user root [preauth] Jan 11 15:01:18 host unix_chkpwd[24702]: password check failed for user (root) Jan 11 15:01:18 host sshd[24698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.181.231 user=root Jan 11 15:01:18 host sshd[24698]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:01:21 host sshd[24698]: Failed password for invalid user root from 149.56.181.231 port 50928 ssh2 Jan 11 15:01:45 host sshd[24810]: User root from 66.70.185.146 not allowed because not listed in AllowUsers Jan 11 15:01:45 host sshd[24810]: input_userauth_request: invalid user root [preauth] Jan 11 15:01:45 host unix_chkpwd[24815]: password check failed for user (root) Jan 11 15:01:45 host sshd[24810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.185.146 user=root Jan 11 15:01:45 host sshd[24810]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:01:47 host sshd[24810]: Failed password for invalid user root from 66.70.185.146 port 49702 ssh2 Jan 11 15:01:47 host sshd[24810]: Received disconnect from 66.70.185.146 port 49702:11: Bye Bye [preauth] Jan 11 15:01:47 host sshd[24810]: Disconnected from 66.70.185.146 port 49702 [preauth] Jan 11 15:01:51 host sshd[24855]: User root from 42.200.11.53 not allowed because not listed in AllowUsers Jan 11 15:01:51 host sshd[24855]: input_userauth_request: invalid user root [preauth] Jan 11 15:01:51 host unix_chkpwd[24889]: password check failed for user (root) Jan 11 15:01:51 host sshd[24855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.11.53 user=root Jan 11 15:01:51 host sshd[24855]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:01:54 host sshd[24855]: Failed password for invalid user root from 42.200.11.53 port 38018 ssh2 Jan 11 15:01:54 host sshd[24855]: Received disconnect from 42.200.11.53 port 38018:11: Bye Bye [preauth] Jan 11 15:01:54 host sshd[24855]: Disconnected from 42.200.11.53 port 38018 [preauth] Jan 11 15:01:54 host sshd[24916]: User root from 197.248.63.75 not allowed because not listed in AllowUsers Jan 11 15:01:54 host sshd[24916]: input_userauth_request: invalid user root [preauth] Jan 11 15:01:54 host unix_chkpwd[24944]: password check failed for user (root) Jan 11 15:01:54 host sshd[24916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.63.75 user=root Jan 11 15:01:54 host sshd[24916]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:01:56 host sshd[24916]: Failed password for invalid user root from 197.248.63.75 port 41408 ssh2 Jan 11 15:01:57 host sshd[24916]: Received disconnect from 197.248.63.75 port 41408:11: Bye Bye [preauth] Jan 11 15:01:57 host sshd[24916]: Disconnected from 197.248.63.75 port 41408 [preauth] Jan 11 15:02:18 host sshd[25003]: User root from 137.184.219.69 not allowed because not listed in AllowUsers Jan 11 15:02:18 host sshd[25003]: input_userauth_request: invalid user root [preauth] Jan 11 15:02:18 host unix_chkpwd[25007]: password check failed for user (root) Jan 11 15:02:18 host sshd[25003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.219.69 user=root Jan 11 15:02:18 host sshd[25003]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:02:20 host sshd[25003]: Failed password for invalid user root from 137.184.219.69 port 46814 ssh2 Jan 11 15:02:20 host sshd[25003]: Received disconnect from 137.184.219.69 port 46814:11: Bye Bye [preauth] Jan 11 15:02:20 host sshd[25003]: Disconnected from 137.184.219.69 port 46814 [preauth] Jan 11 15:02:21 host sshd[25010]: User root from 44.212.52.214 not allowed because not listed in AllowUsers Jan 11 15:02:21 host sshd[25010]: input_userauth_request: invalid user root [preauth] Jan 11 15:02:21 host unix_chkpwd[25015]: password check failed for user (root) Jan 11 15:02:21 host sshd[25010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.212.52.214 user=root Jan 11 15:02:21 host sshd[25010]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:02:23 host sshd[25010]: Failed password for invalid user root from 44.212.52.214 port 43248 ssh2 Jan 11 15:02:23 host sshd[25010]: Received disconnect from 44.212.52.214 port 43248:11: Bye Bye [preauth] Jan 11 15:02:23 host sshd[25010]: Disconnected from 44.212.52.214 port 43248 [preauth] Jan 11 15:02:25 host sshd[25050]: User root from 167.71.236.26 not allowed because not listed in AllowUsers Jan 11 15:02:25 host sshd[25050]: input_userauth_request: invalid user root [preauth] Jan 11 15:02:25 host unix_chkpwd[25054]: password check failed for user (root) Jan 11 15:02:25 host sshd[25050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.236.26 user=root Jan 11 15:02:25 host sshd[25050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:02:26 host sshd[25050]: Failed password for invalid user root from 167.71.236.26 port 57710 ssh2 Jan 11 15:02:26 host sshd[25050]: Received disconnect from 167.71.236.26 port 57710:11: Bye Bye [preauth] Jan 11 15:02:26 host sshd[25050]: Disconnected from 167.71.236.26 port 57710 [preauth] Jan 11 15:02:27 host sshd[25057]: User root from 118.219.54.135 not allowed because not listed in AllowUsers Jan 11 15:02:27 host sshd[25057]: input_userauth_request: invalid user root [preauth] Jan 11 15:02:27 host unix_chkpwd[25059]: password check failed for user (root) Jan 11 15:02:27 host sshd[25057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.219.54.135 user=root Jan 11 15:02:27 host sshd[25057]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:02:29 host sshd[25057]: Failed password for invalid user root from 118.219.54.135 port 41823 ssh2 Jan 11 15:02:29 host sshd[25057]: Received disconnect from 118.219.54.135 port 41823:11: Bye Bye [preauth] Jan 11 15:02:29 host sshd[25057]: Disconnected from 118.219.54.135 port 41823 [preauth] Jan 11 15:02:34 host sshd[25153]: User root from 165.232.177.245 not allowed because not listed in AllowUsers Jan 11 15:02:34 host sshd[25153]: input_userauth_request: invalid user root [preauth] Jan 11 15:02:35 host unix_chkpwd[25156]: password check failed for user (root) Jan 11 15:02:35 host sshd[25153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.177.245 user=root Jan 11 15:02:35 host sshd[25153]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:02:37 host sshd[25153]: Failed password for invalid user root from 165.232.177.245 port 58906 ssh2 Jan 11 15:02:37 host sshd[25153]: Received disconnect from 165.232.177.245 port 58906:11: Bye Bye [preauth] Jan 11 15:02:37 host sshd[25153]: Disconnected from 165.232.177.245 port 58906 [preauth] Jan 11 15:02:45 host sshd[25197]: User root from 120.28.194.18 not allowed because not listed in AllowUsers Jan 11 15:02:45 host sshd[25197]: input_userauth_request: invalid user root [preauth] Jan 11 15:02:45 host unix_chkpwd[25204]: password check failed for user (root) Jan 11 15:02:45 host sshd[25197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.28.194.18 user=root Jan 11 15:02:45 host sshd[25197]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:02:47 host sshd[25197]: Failed password for invalid user root from 120.28.194.18 port 56374 ssh2 Jan 11 15:02:47 host sshd[25197]: Received disconnect from 120.28.194.18 port 56374:11: Bye Bye [preauth] Jan 11 15:02:47 host sshd[25197]: Disconnected from 120.28.194.18 port 56374 [preauth] Jan 11 15:02:52 host sshd[25210]: User root from 43.135.154.128 not allowed because not listed in AllowUsers Jan 11 15:02:52 host sshd[25210]: input_userauth_request: invalid user root [preauth] Jan 11 15:02:52 host unix_chkpwd[25216]: password check failed for user (root) Jan 11 15:02:52 host sshd[25210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.154.128 user=root Jan 11 15:02:52 host sshd[25210]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:02:54 host sshd[25210]: Failed password for invalid user root from 43.135.154.128 port 42702 ssh2 Jan 11 15:02:55 host sshd[25210]: Received disconnect from 43.135.154.128 port 42702:11: Bye Bye [preauth] Jan 11 15:02:55 host sshd[25210]: Disconnected from 43.135.154.128 port 42702 [preauth] Jan 11 15:03:44 host sshd[25361]: User root from 77.171.127.174 not allowed because not listed in AllowUsers Jan 11 15:03:44 host sshd[25361]: input_userauth_request: invalid user root [preauth] Jan 11 15:03:44 host unix_chkpwd[25364]: password check failed for user (root) Jan 11 15:03:44 host sshd[25361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.171.127.174 user=root Jan 11 15:03:44 host sshd[25361]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:03:45 host sshd[25361]: Failed password for invalid user root from 77.171.127.174 port 54226 ssh2 Jan 11 15:03:45 host sshd[25361]: Received disconnect from 77.171.127.174 port 54226:11: Bye Bye [preauth] Jan 11 15:03:45 host sshd[25361]: Disconnected from 77.171.127.174 port 54226 [preauth] Jan 11 15:04:24 host sshd[25423]: User root from 175.155.247.6 not allowed because not listed in AllowUsers Jan 11 15:04:24 host sshd[25423]: input_userauth_request: invalid user root [preauth] Jan 11 15:04:24 host unix_chkpwd[25426]: password check failed for user (root) Jan 11 15:04:24 host sshd[25423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.155.247.6 user=root Jan 11 15:04:24 host sshd[25423]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:04:26 host sshd[25423]: Failed password for invalid user root from 175.155.247.6 port 46857 ssh2 Jan 11 15:04:27 host sshd[25423]: Received disconnect from 175.155.247.6 port 46857:11: Bye Bye [preauth] Jan 11 15:04:27 host sshd[25423]: Disconnected from 175.155.247.6 port 46857 [preauth] Jan 11 15:04:40 host sshd[25460]: Connection closed by 50.223.37.170 port 56496 [preauth] Jan 11 15:04:55 host sshd[25480]: User root from 69.49.235.162 not allowed because not listed in AllowUsers Jan 11 15:04:55 host sshd[25480]: input_userauth_request: invalid user root [preauth] Jan 11 15:04:55 host unix_chkpwd[25485]: password check failed for user (root) Jan 11 15:04:55 host sshd[25480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.235.162 user=root Jan 11 15:04:55 host sshd[25480]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:04:56 host sshd[25488]: User root from 46.24.187.141 not allowed because not listed in AllowUsers Jan 11 15:04:56 host sshd[25488]: input_userauth_request: invalid user root [preauth] Jan 11 15:04:56 host unix_chkpwd[25490]: password check failed for user (root) Jan 11 15:04:56 host sshd[25488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.24.187.141 user=root Jan 11 15:04:56 host sshd[25488]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:04:57 host sshd[25480]: Failed password for invalid user root from 69.49.235.162 port 38620 ssh2 Jan 11 15:04:57 host sshd[25480]: Received disconnect from 69.49.235.162 port 38620:11: Bye Bye [preauth] Jan 11 15:04:57 host sshd[25480]: Disconnected from 69.49.235.162 port 38620 [preauth] Jan 11 15:04:58 host sshd[25488]: Failed password for invalid user root from 46.24.187.141 port 52738 ssh2 Jan 11 15:04:58 host sshd[25488]: Received disconnect from 46.24.187.141 port 52738:11: Bye Bye [preauth] Jan 11 15:04:58 host sshd[25488]: Disconnected from 46.24.187.141 port 52738 [preauth] Jan 11 15:05:27 host sshd[25602]: User root from 175.118.152.100 not allowed because not listed in AllowUsers Jan 11 15:05:27 host sshd[25602]: input_userauth_request: invalid user root [preauth] Jan 11 15:05:27 host unix_chkpwd[25605]: password check failed for user (root) Jan 11 15:05:27 host sshd[25602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.118.152.100 user=root Jan 11 15:05:27 host sshd[25602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:05:30 host sshd[25602]: Failed password for invalid user root from 175.118.152.100 port 56937 ssh2 Jan 11 15:05:30 host sshd[25602]: Received disconnect from 175.118.152.100 port 56937:11: Bye Bye [preauth] Jan 11 15:05:30 host sshd[25602]: Disconnected from 175.118.152.100 port 56937 [preauth] Jan 11 15:06:00 host sshd[25683]: Invalid user patrick from 209.141.56.48 port 53342 Jan 11 15:06:00 host sshd[25683]: input_userauth_request: invalid user patrick [preauth] Jan 11 15:06:00 host sshd[25683]: pam_unix(sshd:auth): check pass; user unknown Jan 11 15:06:00 host sshd[25683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 11 15:06:02 host sshd[25683]: Failed password for invalid user patrick from 209.141.56.48 port 53342 ssh2 Jan 11 15:06:03 host sshd[25683]: Connection closed by 209.141.56.48 port 53342 [preauth] Jan 11 15:06:08 host sshd[25706]: User root from 159.203.66.111 not allowed because not listed in AllowUsers Jan 11 15:06:08 host sshd[25706]: input_userauth_request: invalid user root [preauth] Jan 11 15:06:08 host unix_chkpwd[25709]: password check failed for user (root) Jan 11 15:06:08 host sshd[25706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.66.111 user=root Jan 11 15:06:08 host sshd[25706]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:06:10 host sshd[25706]: Failed password for invalid user root from 159.203.66.111 port 53074 ssh2 Jan 11 15:06:10 host sshd[25706]: Received disconnect from 159.203.66.111 port 53074:11: Bye Bye [preauth] Jan 11 15:06:10 host sshd[25706]: Disconnected from 159.203.66.111 port 53074 [preauth] Jan 11 15:06:13 host sshd[25713]: User root from 137.184.219.69 not allowed because not listed in AllowUsers Jan 11 15:06:13 host sshd[25713]: input_userauth_request: invalid user root [preauth] Jan 11 15:06:13 host unix_chkpwd[25716]: password check failed for user (root) Jan 11 15:06:13 host sshd[25713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.219.69 user=root Jan 11 15:06:13 host sshd[25713]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:06:16 host sshd[25713]: Failed password for invalid user root from 137.184.219.69 port 36254 ssh2 Jan 11 15:06:21 host sshd[25763]: User root from 140.238.122.212 not allowed because not listed in AllowUsers Jan 11 15:06:21 host sshd[25763]: input_userauth_request: invalid user root [preauth] Jan 11 15:06:21 host unix_chkpwd[25766]: password check failed for user (root) Jan 11 15:06:21 host sshd[25763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.122.212 user=root Jan 11 15:06:21 host sshd[25763]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:06:23 host sshd[25763]: Failed password for invalid user root from 140.238.122.212 port 50232 ssh2 Jan 11 15:06:42 host sshd[25850]: User root from 93.125.114.51 not allowed because not listed in AllowUsers Jan 11 15:06:42 host sshd[25850]: input_userauth_request: invalid user root [preauth] Jan 11 15:06:42 host unix_chkpwd[25853]: password check failed for user (root) Jan 11 15:06:42 host sshd[25850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.125.114.51 user=root Jan 11 15:06:42 host sshd[25850]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:06:44 host sshd[25850]: Failed password for invalid user root from 93.125.114.51 port 36686 ssh2 Jan 11 15:06:44 host sshd[25850]: Received disconnect from 93.125.114.51 port 36686:11: Bye Bye [preauth] Jan 11 15:06:44 host sshd[25850]: Disconnected from 93.125.114.51 port 36686 [preauth] Jan 11 15:06:46 host sshd[25866]: User root from 167.71.25.186 not allowed because not listed in AllowUsers Jan 11 15:06:46 host sshd[25866]: input_userauth_request: invalid user root [preauth] Jan 11 15:06:46 host unix_chkpwd[25894]: password check failed for user (root) Jan 11 15:06:46 host sshd[25866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.25.186 user=root Jan 11 15:06:46 host sshd[25866]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:06:47 host sshd[25895]: User root from 77.171.127.174 not allowed because not listed in AllowUsers Jan 11 15:06:47 host sshd[25895]: input_userauth_request: invalid user root [preauth] Jan 11 15:06:48 host unix_chkpwd[25898]: password check failed for user (root) Jan 11 15:06:48 host sshd[25895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.171.127.174 user=root Jan 11 15:06:48 host sshd[25895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:06:48 host sshd[25866]: Failed password for invalid user root from 167.71.25.186 port 49816 ssh2 Jan 11 15:06:48 host sshd[25866]: Received disconnect from 167.71.25.186 port 49816:11: Bye Bye [preauth] Jan 11 15:06:48 host sshd[25866]: Disconnected from 167.71.25.186 port 49816 [preauth] Jan 11 15:06:50 host sshd[25895]: Failed password for invalid user root from 77.171.127.174 port 37704 ssh2 Jan 11 15:06:50 host sshd[25895]: Received disconnect from 77.171.127.174 port 37704:11: Bye Bye [preauth] Jan 11 15:06:50 host sshd[25895]: Disconnected from 77.171.127.174 port 37704 [preauth] Jan 11 15:07:23 host sshd[26116]: User root from 46.24.187.141 not allowed because not listed in AllowUsers Jan 11 15:07:23 host sshd[26116]: input_userauth_request: invalid user root [preauth] Jan 11 15:07:23 host unix_chkpwd[26119]: password check failed for user (root) Jan 11 15:07:23 host sshd[26116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.24.187.141 user=root Jan 11 15:07:23 host sshd[26116]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:07:26 host sshd[26116]: Failed password for invalid user root from 46.24.187.141 port 42458 ssh2 Jan 11 15:07:26 host sshd[26116]: Received disconnect from 46.24.187.141 port 42458:11: Bye Bye [preauth] Jan 11 15:07:26 host sshd[26116]: Disconnected from 46.24.187.141 port 42458 [preauth] Jan 11 15:07:32 host sshd[26177]: User root from 197.248.63.75 not allowed because not listed in AllowUsers Jan 11 15:07:32 host sshd[26177]: input_userauth_request: invalid user root [preauth] Jan 11 15:07:32 host unix_chkpwd[26180]: password check failed for user (root) Jan 11 15:07:32 host sshd[26177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.63.75 user=root Jan 11 15:07:32 host sshd[26177]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:07:34 host sshd[26177]: Failed password for invalid user root from 197.248.63.75 port 57220 ssh2 Jan 11 15:07:35 host sshd[26177]: Received disconnect from 197.248.63.75 port 57220:11: Bye Bye [preauth] Jan 11 15:07:35 host sshd[26177]: Disconnected from 197.248.63.75 port 57220 [preauth] Jan 11 15:07:43 host sshd[26220]: User root from 159.203.66.111 not allowed because not listed in AllowUsers Jan 11 15:07:43 host sshd[26220]: input_userauth_request: invalid user root [preauth] Jan 11 15:07:43 host unix_chkpwd[26223]: password check failed for user (root) Jan 11 15:07:43 host sshd[26220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.66.111 user=root Jan 11 15:07:43 host sshd[26220]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:07:45 host sshd[26220]: Failed password for invalid user root from 159.203.66.111 port 50516 ssh2 Jan 11 15:08:14 host sshd[26314]: User root from 175.118.152.100 not allowed because not listed in AllowUsers Jan 11 15:08:14 host sshd[26314]: input_userauth_request: invalid user root [preauth] Jan 11 15:08:14 host unix_chkpwd[26317]: password check failed for user (root) Jan 11 15:08:14 host sshd[26314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.118.152.100 user=root Jan 11 15:08:14 host sshd[26314]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:08:15 host sshd[26305]: User root from 50.223.37.170 not allowed because not listed in AllowUsers Jan 11 15:08:15 host sshd[26305]: input_userauth_request: invalid user root [preauth] Jan 11 15:08:15 host unix_chkpwd[26329]: password check failed for user (root) Jan 11 15:08:15 host sshd[26305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.223.37.170 user=root Jan 11 15:08:15 host sshd[26305]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:08:15 host sshd[26314]: Failed password for invalid user root from 175.118.152.100 port 45769 ssh2 Jan 11 15:08:15 host sshd[26314]: Received disconnect from 175.118.152.100 port 45769:11: Bye Bye [preauth] Jan 11 15:08:15 host sshd[26314]: Disconnected from 175.118.152.100 port 45769 [preauth] Jan 11 15:08:17 host sshd[26305]: Failed password for invalid user root from 50.223.37.170 port 52522 ssh2 Jan 11 15:08:18 host sshd[26305]: Received disconnect from 50.223.37.170 port 52522:11: Bye Bye [preauth] Jan 11 15:08:18 host sshd[26305]: Disconnected from 50.223.37.170 port 52522 [preauth] Jan 11 15:09:43 host sshd[26562]: User root from 43.159.32.228 not allowed because not listed in AllowUsers Jan 11 15:09:43 host sshd[26562]: input_userauth_request: invalid user root [preauth] Jan 11 15:09:43 host unix_chkpwd[26564]: password check failed for user (root) Jan 11 15:09:43 host sshd[26562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.32.228 user=root Jan 11 15:09:43 host sshd[26562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:09:45 host sshd[26562]: Failed password for invalid user root from 43.159.32.228 port 34444 ssh2 Jan 11 15:09:45 host sshd[26562]: Received disconnect from 43.159.32.228 port 34444:11: Bye Bye [preauth] Jan 11 15:09:45 host sshd[26562]: Disconnected from 43.159.32.228 port 34444 [preauth] Jan 11 15:10:15 host sshd[26670]: User root from 42.200.11.53 not allowed because not listed in AllowUsers Jan 11 15:10:15 host sshd[26670]: input_userauth_request: invalid user root [preauth] Jan 11 15:10:15 host unix_chkpwd[26679]: password check failed for user (root) Jan 11 15:10:15 host sshd[26670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.11.53 user=root Jan 11 15:10:15 host sshd[26670]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:10:17 host sshd[26670]: Failed password for invalid user root from 42.200.11.53 port 35246 ssh2 Jan 11 15:10:17 host sshd[26670]: Received disconnect from 42.200.11.53 port 35246:11: Bye Bye [preauth] Jan 11 15:10:17 host sshd[26670]: Disconnected from 42.200.11.53 port 35246 [preauth] Jan 11 15:13:54 host sshd[27251]: User root from 120.28.194.18 not allowed because not listed in AllowUsers Jan 11 15:13:54 host sshd[27251]: input_userauth_request: invalid user root [preauth] Jan 11 15:13:54 host unix_chkpwd[27256]: password check failed for user (root) Jan 11 15:13:54 host sshd[27251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.28.194.18 user=root Jan 11 15:13:54 host sshd[27251]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:13:55 host sshd[27253]: User root from 175.155.247.6 not allowed because not listed in AllowUsers Jan 11 15:13:55 host sshd[27253]: input_userauth_request: invalid user root [preauth] Jan 11 15:13:55 host unix_chkpwd[27260]: password check failed for user (root) Jan 11 15:13:55 host sshd[27253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.155.247.6 user=root Jan 11 15:13:55 host sshd[27253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:13:57 host sshd[27251]: Failed password for invalid user root from 120.28.194.18 port 32856 ssh2 Jan 11 15:13:57 host sshd[27253]: Failed password for invalid user root from 175.155.247.6 port 47971 ssh2 Jan 11 15:15:56 host sshd[27541]: User root from 41.76.172.121 not allowed because not listed in AllowUsers Jan 11 15:15:56 host sshd[27541]: input_userauth_request: invalid user root [preauth] Jan 11 15:15:56 host unix_chkpwd[27545]: password check failed for user (root) Jan 11 15:15:56 host sshd[27541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.172.121 user=root Jan 11 15:15:56 host sshd[27541]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:15:58 host sshd[27541]: Failed password for invalid user root from 41.76.172.121 port 38720 ssh2 Jan 11 15:15:59 host sshd[27541]: Received disconnect from 41.76.172.121 port 38720:11: Bye Bye [preauth] Jan 11 15:15:59 host sshd[27541]: Disconnected from 41.76.172.121 port 38720 [preauth] Jan 11 15:20:02 host sshd[28104]: Invalid user cn from 194.110.203.109 port 46052 Jan 11 15:20:02 host sshd[28104]: input_userauth_request: invalid user cn [preauth] Jan 11 15:20:02 host sshd[28104]: pam_unix(sshd:auth): check pass; user unknown Jan 11 15:20:02 host sshd[28104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 15:20:04 host sshd[28104]: Failed password for invalid user cn from 194.110.203.109 port 46052 ssh2 Jan 11 15:20:07 host sshd[28104]: pam_unix(sshd:auth): check pass; user unknown Jan 11 15:20:09 host sshd[28104]: Failed password for invalid user cn from 194.110.203.109 port 46052 ssh2 Jan 11 15:20:12 host sshd[28104]: pam_unix(sshd:auth): check pass; user unknown Jan 11 15:20:14 host sshd[28104]: Failed password for invalid user cn from 194.110.203.109 port 46052 ssh2 Jan 11 15:20:18 host sshd[28104]: Connection closed by 194.110.203.109 port 46052 [preauth] Jan 11 15:20:18 host sshd[28104]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 15:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 15:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=remysagr user-15=disposeat user-16=wwwkmaorg user-17=pmcresources user-18=vfmassets user-19=wwwtestugo user-20=shalinijames user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=gifterman user-28=palco123 user-29=kottayamcalldriv user-30=phmetals feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 15:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-whUZ9gQbw0EHzPyw.~ Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-whUZ9gQbw0EHzPyw.~' Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-whUZ9gQbw0EHzPyw.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 15:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 15:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 15:22:47 host sshd[28800]: User root from 41.76.172.121 not allowed because not listed in AllowUsers Jan 11 15:22:47 host sshd[28800]: input_userauth_request: invalid user root [preauth] Jan 11 15:22:47 host unix_chkpwd[28804]: password check failed for user (root) Jan 11 15:22:47 host sshd[28800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.172.121 user=root Jan 11 15:22:47 host sshd[28800]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:22:49 host sshd[28800]: Failed password for invalid user root from 41.76.172.121 port 55019 ssh2 Jan 11 15:22:49 host sshd[28800]: Received disconnect from 41.76.172.121 port 55019:11: Bye Bye [preauth] Jan 11 15:22:49 host sshd[28800]: Disconnected from 41.76.172.121 port 55019 [preauth] Jan 11 15:29:30 host sshd[29851]: Invalid user patrick from 209.141.56.48 port 42514 Jan 11 15:29:30 host sshd[29851]: input_userauth_request: invalid user patrick [preauth] Jan 11 15:29:30 host sshd[29851]: pam_unix(sshd:auth): check pass; user unknown Jan 11 15:29:30 host sshd[29851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 11 15:29:32 host sshd[29851]: Failed password for invalid user patrick from 209.141.56.48 port 42514 ssh2 Jan 11 15:32:48 host sshd[30442]: Did not receive identification string from 89.189.188.33 port 46126 Jan 11 15:47:51 host sshd[32561]: User root from 143.198.208.129 not allowed because not listed in AllowUsers Jan 11 15:47:51 host sshd[32561]: input_userauth_request: invalid user root [preauth] Jan 11 15:47:51 host unix_chkpwd[32563]: password check failed for user (root) Jan 11 15:47:51 host sshd[32561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.208.129 user=root Jan 11 15:47:51 host sshd[32561]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:47:53 host sshd[32561]: Failed password for invalid user root from 143.198.208.129 port 56584 ssh2 Jan 11 15:47:53 host sshd[32561]: Received disconnect from 143.198.208.129 port 56584:11: Bye Bye [preauth] Jan 11 15:47:53 host sshd[32561]: Disconnected from 143.198.208.129 port 56584 [preauth] Jan 11 15:48:16 host sshd[32600]: User root from 186.15.164.139 not allowed because not listed in AllowUsers Jan 11 15:48:16 host sshd[32600]: input_userauth_request: invalid user root [preauth] Jan 11 15:48:16 host unix_chkpwd[32604]: password check failed for user (root) Jan 11 15:48:16 host sshd[32600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.15.164.139 user=root Jan 11 15:48:16 host sshd[32600]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:48:18 host sshd[32600]: Failed password for invalid user root from 186.15.164.139 port 46830 ssh2 Jan 11 15:48:18 host sshd[32600]: Received disconnect from 186.15.164.139 port 46830:11: Bye Bye [preauth] Jan 11 15:48:18 host sshd[32600]: Disconnected from 186.15.164.139 port 46830 [preauth] Jan 11 15:50:49 host sshd[577]: User root from 218.255.245.10 not allowed because not listed in AllowUsers Jan 11 15:50:49 host sshd[577]: input_userauth_request: invalid user root [preauth] Jan 11 15:50:49 host unix_chkpwd[579]: password check failed for user (root) Jan 11 15:50:49 host sshd[577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.255.245.10 user=root Jan 11 15:50:49 host sshd[577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:50:51 host sshd[577]: Failed password for invalid user root from 218.255.245.10 port 35220 ssh2 Jan 11 15:50:51 host sshd[577]: Received disconnect from 218.255.245.10 port 35220:11: Bye Bye [preauth] Jan 11 15:50:51 host sshd[577]: Disconnected from 218.255.245.10 port 35220 [preauth] Jan 11 15:51:33 host sshd[692]: User root from 188.166.240.186 not allowed because not listed in AllowUsers Jan 11 15:51:33 host sshd[692]: input_userauth_request: invalid user root [preauth] Jan 11 15:51:33 host unix_chkpwd[694]: password check failed for user (root) Jan 11 15:51:33 host sshd[692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.186 user=root Jan 11 15:51:33 host sshd[692]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:51:34 host sshd[692]: Failed password for invalid user root from 188.166.240.186 port 60290 ssh2 Jan 11 15:51:34 host sshd[692]: Received disconnect from 188.166.240.186 port 60290:11: Bye Bye [preauth] Jan 11 15:51:34 host sshd[692]: Disconnected from 188.166.240.186 port 60290 [preauth] Jan 11 15:51:44 host sshd[708]: User root from 167.99.5.226 not allowed because not listed in AllowUsers Jan 11 15:51:44 host sshd[708]: input_userauth_request: invalid user root [preauth] Jan 11 15:51:44 host unix_chkpwd[712]: password check failed for user (root) Jan 11 15:51:44 host sshd[708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.5.226 user=root Jan 11 15:51:44 host sshd[708]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:51:45 host sshd[708]: Failed password for invalid user root from 167.99.5.226 port 38188 ssh2 Jan 11 15:51:45 host sshd[708]: Received disconnect from 167.99.5.226 port 38188:11: Bye Bye [preauth] Jan 11 15:51:45 host sshd[708]: Disconnected from 167.99.5.226 port 38188 [preauth] Jan 11 15:53:08 host sshd[885]: User root from 143.198.208.129 not allowed because not listed in AllowUsers Jan 11 15:53:08 host sshd[885]: input_userauth_request: invalid user root [preauth] Jan 11 15:53:09 host unix_chkpwd[887]: password check failed for user (root) Jan 11 15:53:09 host sshd[885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.208.129 user=root Jan 11 15:53:09 host sshd[885]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:53:10 host sshd[885]: Failed password for invalid user root from 143.198.208.129 port 56830 ssh2 Jan 11 15:53:10 host sshd[885]: Received disconnect from 143.198.208.129 port 56830:11: Bye Bye [preauth] Jan 11 15:53:10 host sshd[885]: Disconnected from 143.198.208.129 port 56830 [preauth] Jan 11 15:53:28 host sshd[950]: User root from 167.99.5.226 not allowed because not listed in AllowUsers Jan 11 15:53:28 host sshd[950]: input_userauth_request: invalid user root [preauth] Jan 11 15:53:28 host unix_chkpwd[953]: password check failed for user (root) Jan 11 15:53:28 host sshd[950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.5.226 user=root Jan 11 15:53:28 host sshd[950]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:53:30 host sshd[950]: Failed password for invalid user root from 167.99.5.226 port 41486 ssh2 Jan 11 15:53:30 host sshd[950]: Received disconnect from 167.99.5.226 port 41486:11: Bye Bye [preauth] Jan 11 15:53:30 host sshd[950]: Disconnected from 167.99.5.226 port 41486 [preauth] Jan 11 15:53:39 host sshd[1013]: User root from 186.15.164.139 not allowed because not listed in AllowUsers Jan 11 15:53:39 host sshd[1013]: input_userauth_request: invalid user root [preauth] Jan 11 15:53:39 host unix_chkpwd[1018]: password check failed for user (root) Jan 11 15:53:39 host sshd[1013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.15.164.139 user=root Jan 11 15:53:39 host sshd[1013]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:53:40 host sshd[1013]: Failed password for invalid user root from 186.15.164.139 port 43042 ssh2 Jan 11 15:53:41 host sshd[1013]: Received disconnect from 186.15.164.139 port 43042:11: Bye Bye [preauth] Jan 11 15:53:41 host sshd[1013]: Disconnected from 186.15.164.139 port 43042 [preauth] Jan 11 15:53:47 host sshd[1055]: User root from 218.255.245.10 not allowed because not listed in AllowUsers Jan 11 15:53:47 host sshd[1055]: input_userauth_request: invalid user root [preauth] Jan 11 15:53:47 host unix_chkpwd[1059]: password check failed for user (root) Jan 11 15:53:47 host sshd[1055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.255.245.10 user=root Jan 11 15:53:47 host sshd[1055]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:53:49 host sshd[1055]: Failed password for invalid user root from 218.255.245.10 port 54077 ssh2 Jan 11 15:53:49 host sshd[1055]: Received disconnect from 218.255.245.10 port 54077:11: Bye Bye [preauth] Jan 11 15:53:49 host sshd[1055]: Disconnected from 218.255.245.10 port 54077 [preauth] Jan 11 15:54:07 host sshd[1124]: User root from 188.166.240.186 not allowed because not listed in AllowUsers Jan 11 15:54:07 host sshd[1124]: input_userauth_request: invalid user root [preauth] Jan 11 15:54:07 host unix_chkpwd[1126]: password check failed for user (root) Jan 11 15:54:07 host sshd[1124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.186 user=root Jan 11 15:54:07 host sshd[1124]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:54:09 host sshd[1124]: Failed password for invalid user root from 188.166.240.186 port 38750 ssh2 Jan 11 15:54:09 host sshd[1124]: Received disconnect from 188.166.240.186 port 38750:11: Bye Bye [preauth] Jan 11 15:54:09 host sshd[1124]: Disconnected from 188.166.240.186 port 38750 [preauth] Jan 11 15:54:16 host sshd[1167]: User root from 43.159.32.187 not allowed because not listed in AllowUsers Jan 11 15:54:16 host sshd[1167]: input_userauth_request: invalid user root [preauth] Jan 11 15:54:16 host unix_chkpwd[1169]: password check failed for user (root) Jan 11 15:54:16 host sshd[1167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.32.187 user=root Jan 11 15:54:16 host sshd[1167]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:54:18 host sshd[1167]: Failed password for invalid user root from 43.159.32.187 port 42352 ssh2 Jan 11 15:54:18 host sshd[1167]: Received disconnect from 43.159.32.187 port 42352:11: Bye Bye [preauth] Jan 11 15:54:18 host sshd[1167]: Disconnected from 43.159.32.187 port 42352 [preauth] Jan 11 15:57:47 host sshd[1717]: User root from 43.159.32.187 not allowed because not listed in AllowUsers Jan 11 15:57:47 host sshd[1717]: input_userauth_request: invalid user root [preauth] Jan 11 15:57:47 host unix_chkpwd[1721]: password check failed for user (root) Jan 11 15:57:47 host sshd[1717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.32.187 user=root Jan 11 15:57:47 host sshd[1717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 15:57:49 host sshd[1717]: Failed password for invalid user root from 43.159.32.187 port 45272 ssh2 Jan 11 15:57:49 host sshd[1717]: Received disconnect from 43.159.32.187 port 45272:11: Bye Bye [preauth] Jan 11 15:57:49 host sshd[1717]: Disconnected from 43.159.32.187 port 45272 [preauth] Jan 11 16:02:25 host sshd[2496]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 11 16:02:25 host sshd[2496]: input_userauth_request: invalid user root [preauth] Jan 11 16:02:25 host unix_chkpwd[2499]: password check failed for user (root) Jan 11 16:02:25 host sshd[2496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 11 16:02:25 host sshd[2496]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 16:02:27 host sshd[2496]: Failed password for invalid user root from 194.169.175.102 port 56763 ssh2 Jan 11 16:02:27 host sshd[2496]: Received disconnect from 194.169.175.102 port 56763:11: Client disconnecting normally [preauth] Jan 11 16:02:27 host sshd[2496]: Disconnected from 194.169.175.102 port 56763 [preauth] Jan 11 16:21:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 16:21:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=disposeat user-4=wwwkmaorg user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=wwwletsstalkfood user-11=straightcurve user-12=bonifacegroup user-13=wwwevmhonda user-14=mrsclean user-15=wwwnexidigital user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 16:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-woO0aR1Bcr1WqSUt.~ Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-woO0aR1Bcr1WqSUt.~' Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-woO0aR1Bcr1WqSUt.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 16:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 16:34:37 host sshd[6961]: Invalid user code87 from 159.89.52.177 port 38716 Jan 11 16:34:37 host sshd[6961]: input_userauth_request: invalid user code87 [preauth] Jan 11 16:34:38 host sshd[6961]: pam_unix(sshd:auth): check pass; user unknown Jan 11 16:34:38 host sshd[6961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.52.177 Jan 11 16:34:40 host sshd[6961]: Failed password for invalid user code87 from 159.89.52.177 port 38716 ssh2 Jan 11 16:34:40 host sshd[6961]: Received disconnect from 159.89.52.177 port 38716:11: Bye Bye [preauth] Jan 11 16:34:40 host sshd[6961]: Disconnected from 159.89.52.177 port 38716 [preauth] Jan 11 16:41:08 host sshd[7783]: User root from 190.210.182.179 not allowed because not listed in AllowUsers Jan 11 16:41:08 host sshd[7783]: input_userauth_request: invalid user root [preauth] Jan 11 16:41:08 host unix_chkpwd[7788]: password check failed for user (root) Jan 11 16:41:08 host sshd[7783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.182.179 user=root Jan 11 16:41:08 host sshd[7783]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 16:41:10 host sshd[7783]: Failed password for invalid user root from 190.210.182.179 port 32879 ssh2 Jan 11 16:41:11 host sshd[7783]: Received disconnect from 190.210.182.179 port 32879:11: Bye Bye [preauth] Jan 11 16:41:11 host sshd[7783]: Disconnected from 190.210.182.179 port 32879 [preauth] Jan 11 16:43:47 host sshd[8197]: User root from 190.210.182.179 not allowed because not listed in AllowUsers Jan 11 16:43:47 host sshd[8197]: input_userauth_request: invalid user root [preauth] Jan 11 16:43:47 host unix_chkpwd[8200]: password check failed for user (root) Jan 11 16:43:47 host sshd[8197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.182.179 user=root Jan 11 16:43:47 host sshd[8197]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 16:43:48 host sshd[8197]: Failed password for invalid user root from 190.210.182.179 port 47389 ssh2 Jan 11 16:43:49 host sshd[8197]: Received disconnect from 190.210.182.179 port 47389:11: Bye Bye [preauth] Jan 11 16:43:49 host sshd[8197]: Disconnected from 190.210.182.179 port 47389 [preauth] Jan 11 16:51:52 host sshd[9334]: User root from 68.168.142.91 not allowed because not listed in AllowUsers Jan 11 16:51:52 host sshd[9334]: input_userauth_request: invalid user root [preauth] Jan 11 16:51:52 host unix_chkpwd[9337]: password check failed for user (root) Jan 11 16:51:52 host sshd[9334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.142.91 user=root Jan 11 16:51:52 host sshd[9334]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 16:51:55 host sshd[9334]: Failed password for invalid user root from 68.168.142.91 port 44056 ssh2 Jan 11 16:51:55 host sshd[9334]: Received disconnect from 68.168.142.91 port 44056:11: Bye Bye [preauth] Jan 11 16:51:55 host sshd[9334]: Disconnected from 68.168.142.91 port 44056 [preauth] Jan 11 16:56:12 host sshd[9907]: User root from 68.168.142.91 not allowed because not listed in AllowUsers Jan 11 16:56:12 host sshd[9907]: input_userauth_request: invalid user root [preauth] Jan 11 16:56:12 host unix_chkpwd[9913]: password check failed for user (root) Jan 11 16:56:12 host sshd[9907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.142.91 user=root Jan 11 16:56:12 host sshd[9907]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 16:56:15 host sshd[9907]: Failed password for invalid user root from 68.168.142.91 port 48060 ssh2 Jan 11 17:09:27 host sshd[11734]: Did not receive identification string from 198.235.24.23 port 56523 Jan 11 17:18:30 host sshd[13198]: Invalid user co from 194.110.203.109 port 43640 Jan 11 17:18:30 host sshd[13198]: input_userauth_request: invalid user co [preauth] Jan 11 17:18:30 host sshd[13198]: pam_unix(sshd:auth): check pass; user unknown Jan 11 17:18:30 host sshd[13198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 17:18:32 host sshd[13198]: Failed password for invalid user co from 194.110.203.109 port 43640 ssh2 Jan 11 17:18:35 host sshd[13198]: pam_unix(sshd:auth): check pass; user unknown Jan 11 17:18:37 host sshd[13198]: Failed password for invalid user co from 194.110.203.109 port 43640 ssh2 Jan 11 17:18:40 host sshd[13198]: pam_unix(sshd:auth): check pass; user unknown Jan 11 17:18:42 host sshd[13198]: Failed password for invalid user co from 194.110.203.109 port 43640 ssh2 Jan 11 17:18:45 host sshd[13198]: Connection closed by 194.110.203.109 port 43640 [preauth] Jan 11 17:18:45 host sshd[13198]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=mrsclean user-22=wwwnexidigital user-23=kottayamcalldriv user-24=phmetals user-25=palco123 user-26=gifterman user-27=straightcurve user-28=wwwletsstalkfood user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 17:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Y0dINUHwZ2VAwofs.~ Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Y0dINUHwZ2VAwofs.~' Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Y0dINUHwZ2VAwofs.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 17:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 17:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 17:23:35 host sshd[14267]: Invalid user user from 190.206.231.3 port 39203 Jan 11 17:23:35 host sshd[14267]: input_userauth_request: invalid user user [preauth] Jan 11 17:23:36 host sshd[14267]: pam_unix(sshd:auth): check pass; user unknown Jan 11 17:23:36 host sshd[14267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.206.231.3 Jan 11 17:23:38 host sshd[14267]: Failed password for invalid user user from 190.206.231.3 port 39203 ssh2 Jan 11 17:23:38 host sshd[14267]: Connection closed by 190.206.231.3 port 39203 [preauth] Jan 11 17:35:16 host sshd[16045]: Invalid user victor from 107.189.30.59 port 44096 Jan 11 17:35:16 host sshd[16045]: input_userauth_request: invalid user victor [preauth] Jan 11 17:35:16 host sshd[16045]: pam_unix(sshd:auth): check pass; user unknown Jan 11 17:35:16 host sshd[16045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 11 17:35:17 host sshd[16045]: Failed password for invalid user victor from 107.189.30.59 port 44096 ssh2 Jan 11 17:35:18 host sshd[16045]: Connection closed by 107.189.30.59 port 44096 [preauth] Jan 11 17:54:39 host sshd[20196]: Bad protocol version identification '\003' from 185.73.124.50 port 64901 Jan 11 18:04:04 host sshd[21472]: User root from 177.99.225.31 not allowed because not listed in AllowUsers Jan 11 18:04:04 host sshd[21472]: input_userauth_request: invalid user root [preauth] Jan 11 18:04:05 host unix_chkpwd[21479]: password check failed for user (root) Jan 11 18:04:05 host sshd[21472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.99.225.31 user=root Jan 11 18:04:05 host sshd[21472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 18:04:07 host sshd[21472]: Failed password for invalid user root from 177.99.225.31 port 33511 ssh2 Jan 11 18:04:07 host sshd[21472]: Connection closed by 177.99.225.31 port 33511 [preauth] Jan 11 18:05:13 host sshd[21619]: Invalid user unix from 205.185.113.129 port 59844 Jan 11 18:05:13 host sshd[21619]: input_userauth_request: invalid user unix [preauth] Jan 11 18:05:13 host sshd[21619]: pam_unix(sshd:auth): check pass; user unknown Jan 11 18:05:13 host sshd[21619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 11 18:05:16 host sshd[21619]: Failed password for invalid user unix from 205.185.113.129 port 59844 ssh2 Jan 11 18:05:16 host sshd[21619]: Connection closed by 205.185.113.129 port 59844 [preauth] Jan 11 18:05:56 host sshd[21688]: User root from 210.91.73.167 not allowed because not listed in AllowUsers Jan 11 18:05:56 host sshd[21688]: input_userauth_request: invalid user root [preauth] Jan 11 18:05:56 host unix_chkpwd[21691]: password check failed for user (root) Jan 11 18:05:56 host sshd[21688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.91.73.167 user=root Jan 11 18:05:56 host sshd[21688]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 18:05:58 host sshd[21688]: Failed password for invalid user root from 210.91.73.167 port 56692 ssh2 Jan 11 18:05:58 host sshd[21688]: Received disconnect from 210.91.73.167 port 56692:11: Bye Bye [preauth] Jan 11 18:05:58 host sshd[21688]: Disconnected from 210.91.73.167 port 56692 [preauth] Jan 11 18:08:40 host sshd[22100]: Did not receive identification string from 159.65.88.187 port 58900 Jan 11 18:09:56 host sshd[22246]: User root from 210.91.73.167 not allowed because not listed in AllowUsers Jan 11 18:09:56 host sshd[22246]: input_userauth_request: invalid user root [preauth] Jan 11 18:09:56 host unix_chkpwd[22249]: password check failed for user (root) Jan 11 18:09:56 host sshd[22246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.91.73.167 user=root Jan 11 18:09:56 host sshd[22246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 18:09:58 host sshd[22246]: Failed password for invalid user root from 210.91.73.167 port 38714 ssh2 Jan 11 18:10:10 host sshd[22315]: Did not receive identification string from 172.105.128.11 port 13196 Jan 11 18:10:11 host sshd[22317]: Did not receive identification string from 172.105.128.11 port 13212 Jan 11 18:10:14 host sshd[22319]: Connection closed by 172.105.128.11 port 47772 [preauth] Jan 11 18:10:58 host sshd[22391]: User root from 52.231.33.180 not allowed because not listed in AllowUsers Jan 11 18:10:58 host sshd[22391]: input_userauth_request: invalid user root [preauth] Jan 11 18:10:58 host unix_chkpwd[22393]: password check failed for user (root) Jan 11 18:10:58 host sshd[22391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.33.180 user=root Jan 11 18:10:58 host sshd[22391]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 18:11:00 host sshd[22391]: Failed password for invalid user root from 52.231.33.180 port 44182 ssh2 Jan 11 18:11:00 host sshd[22391]: Received disconnect from 52.231.33.180 port 44182:11: Bye Bye [preauth] Jan 11 18:11:00 host sshd[22391]: Disconnected from 52.231.33.180 port 44182 [preauth] Jan 11 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 18:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RSvjGvgtTJ3xlfA2.~ Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RSvjGvgtTJ3xlfA2.~' Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RSvjGvgtTJ3xlfA2.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 18:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 18:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 18:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 18:24:52 host sshd[24594]: Connection closed by 94.102.49.193 port 34818 [preauth] Jan 11 18:24:52 host sshd[24591]: Connection closed by 94.102.49.193 port 33592 [preauth] Jan 11 18:33:54 host sshd[25823]: Connection closed by 67.207.95.230 port 34324 [preauth] Jan 11 18:44:32 host sshd[27433]: User root from 110.239.177.206 not allowed because not listed in AllowUsers Jan 11 18:44:32 host sshd[27433]: input_userauth_request: invalid user root [preauth] Jan 11 18:44:33 host unix_chkpwd[27438]: password check failed for user (root) Jan 11 18:44:33 host sshd[27433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.239.177.206 user=root Jan 11 18:44:33 host sshd[27433]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 18:44:36 host sshd[27433]: Failed password for invalid user root from 110.239.177.206 port 39650 ssh2 Jan 11 18:44:36 host sshd[27433]: Connection closed by 110.239.177.206 port 39650 [preauth] Jan 11 18:59:10 host sshd[30361]: User root from 46.8.19.64 not allowed because not listed in AllowUsers Jan 11 18:59:10 host sshd[30361]: input_userauth_request: invalid user root [preauth] Jan 11 18:59:10 host unix_chkpwd[30364]: password check failed for user (root) Jan 11 18:59:10 host sshd[30361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.8.19.64 user=root Jan 11 18:59:10 host sshd[30361]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 18:59:12 host sshd[30361]: Failed password for invalid user root from 46.8.19.64 port 43678 ssh2 Jan 11 18:59:12 host sshd[30361]: Received disconnect from 46.8.19.64 port 43678:11: Bye Bye [preauth] Jan 11 18:59:12 host sshd[30361]: Disconnected from 46.8.19.64 port 43678 [preauth] Jan 11 19:04:06 host sshd[31123]: User root from 117.4.121.141 not allowed because not listed in AllowUsers Jan 11 19:04:06 host sshd[31123]: input_userauth_request: invalid user root [preauth] Jan 11 19:04:07 host unix_chkpwd[31130]: password check failed for user (root) Jan 11 19:04:07 host sshd[31123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.4.121.141 user=root Jan 11 19:04:07 host sshd[31123]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 19:04:09 host sshd[31123]: Failed password for invalid user root from 117.4.121.141 port 18064 ssh2 Jan 11 19:04:14 host sshd[31123]: Connection closed by 117.4.121.141 port 18064 [preauth] Jan 11 19:04:55 host sshd[31213]: User root from 46.8.19.64 not allowed because not listed in AllowUsers Jan 11 19:04:55 host sshd[31213]: input_userauth_request: invalid user root [preauth] Jan 11 19:04:55 host unix_chkpwd[31216]: password check failed for user (root) Jan 11 19:04:55 host sshd[31213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.8.19.64 user=root Jan 11 19:04:55 host sshd[31213]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 19:04:58 host sshd[31213]: Failed password for invalid user root from 46.8.19.64 port 45630 ssh2 Jan 11 19:04:58 host sshd[31213]: Received disconnect from 46.8.19.64 port 45630:11: Bye Bye [preauth] Jan 11 19:04:58 host sshd[31213]: Disconnected from 46.8.19.64 port 45630 [preauth] Jan 11 19:07:55 host sshd[31667]: Bad protocol version identification '\003' from 91.191.209.202 port 61776 Jan 11 19:09:24 host sshd[31822]: Invalid user cp from 194.110.203.109 port 60994 Jan 11 19:09:24 host sshd[31822]: input_userauth_request: invalid user cp [preauth] Jan 11 19:09:24 host sshd[31822]: pam_unix(sshd:auth): check pass; user unknown Jan 11 19:09:24 host sshd[31822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 19:09:26 host sshd[31822]: Failed password for invalid user cp from 194.110.203.109 port 60994 ssh2 Jan 11 19:09:29 host sshd[31822]: pam_unix(sshd:auth): check pass; user unknown Jan 11 19:09:31 host sshd[31822]: Failed password for invalid user cp from 194.110.203.109 port 60994 ssh2 Jan 11 19:09:34 host sshd[31822]: pam_unix(sshd:auth): check pass; user unknown Jan 11 19:09:36 host sshd[31822]: Failed password for invalid user cp from 194.110.203.109 port 60994 ssh2 Jan 11 19:09:40 host sshd[31822]: Connection closed by 194.110.203.109 port 60994 [preauth] Jan 11 19:09:40 host sshd[31822]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=palco123 user-11=gifterman user-12=kottayamcalldriv user-13=phmetals user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 19:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aeov54KTblqrxcGs.~ Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aeov54KTblqrxcGs.~' Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-aeov54KTblqrxcGs.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 19:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 19:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 19:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 19:43:09 host sshd[4184]: Invalid user pi from 119.166.180.191 port 35960 Jan 11 19:43:09 host sshd[4184]: input_userauth_request: invalid user pi [preauth] Jan 11 19:43:09 host sshd[4185]: Invalid user pi from 119.166.180.191 port 35958 Jan 11 19:43:09 host sshd[4185]: input_userauth_request: invalid user pi [preauth] Jan 11 19:43:09 host sshd[4184]: pam_unix(sshd:auth): check pass; user unknown Jan 11 19:43:09 host sshd[4184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.166.180.191 Jan 11 19:43:09 host sshd[4185]: pam_unix(sshd:auth): check pass; user unknown Jan 11 19:43:09 host sshd[4185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.166.180.191 Jan 11 19:43:10 host sshd[4184]: Failed password for invalid user pi from 119.166.180.191 port 35960 ssh2 Jan 11 19:43:10 host sshd[4185]: Failed password for invalid user pi from 119.166.180.191 port 35958 ssh2 Jan 11 19:43:11 host sshd[4184]: Connection closed by 119.166.180.191 port 35960 [preauth] Jan 11 19:43:11 host sshd[4185]: Connection closed by 119.166.180.191 port 35958 [preauth] Jan 11 19:44:18 host sshd[4459]: Invalid user admin from 103.237.21.84 port 59514 Jan 11 19:44:18 host sshd[4459]: input_userauth_request: invalid user admin [preauth] Jan 11 19:44:19 host sshd[4459]: pam_unix(sshd:auth): check pass; user unknown Jan 11 19:44:19 host sshd[4459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.237.21.84 Jan 11 19:44:20 host sshd[4459]: Failed password for invalid user admin from 103.237.21.84 port 59514 ssh2 Jan 11 19:44:21 host sshd[4459]: Connection closed by 103.237.21.84 port 59514 [preauth] Jan 11 20:03:09 host sshd[7101]: User root from 221.215.48.75 not allowed because not listed in AllowUsers Jan 11 20:03:09 host sshd[7101]: input_userauth_request: invalid user root [preauth] Jan 11 20:03:09 host unix_chkpwd[7104]: password check failed for user (root) Jan 11 20:03:09 host sshd[7101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.215.48.75 user=root Jan 11 20:03:09 host sshd[7101]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:03:11 host sshd[7101]: Failed password for invalid user root from 221.215.48.75 port 25475 ssh2 Jan 11 20:03:12 host sshd[7101]: Received disconnect from 221.215.48.75 port 25475:11: Bye Bye [preauth] Jan 11 20:03:12 host sshd[7101]: Disconnected from 221.215.48.75 port 25475 [preauth] Jan 11 20:03:26 host sshd[7131]: User root from 24.173.203.83 not allowed because not listed in AllowUsers Jan 11 20:03:26 host sshd[7131]: input_userauth_request: invalid user root [preauth] Jan 11 20:03:26 host unix_chkpwd[7141]: password check failed for user (root) Jan 11 20:03:26 host sshd[7131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.173.203.83 user=root Jan 11 20:03:26 host sshd[7131]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:03:28 host sshd[7131]: Failed password for invalid user root from 24.173.203.83 port 36708 ssh2 Jan 11 20:03:28 host sshd[7131]: Received disconnect from 24.173.203.83 port 36708:11: Bye Bye [preauth] Jan 11 20:03:28 host sshd[7131]: Disconnected from 24.173.203.83 port 36708 [preauth] Jan 11 20:03:58 host sshd[7204]: User root from 211.44.212.27 not allowed because not listed in AllowUsers Jan 11 20:03:58 host sshd[7204]: input_userauth_request: invalid user root [preauth] Jan 11 20:03:58 host unix_chkpwd[7206]: password check failed for user (root) Jan 11 20:03:58 host sshd[7204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.44.212.27 user=root Jan 11 20:03:58 host sshd[7204]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:03:59 host sshd[7207]: User root from 43.157.7.25 not allowed because not listed in AllowUsers Jan 11 20:03:59 host sshd[7207]: input_userauth_request: invalid user root [preauth] Jan 11 20:03:59 host unix_chkpwd[7212]: password check failed for user (root) Jan 11 20:03:59 host sshd[7207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.7.25 user=root Jan 11 20:03:59 host sshd[7207]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:04:00 host sshd[7204]: Failed password for invalid user root from 211.44.212.27 port 43022 ssh2 Jan 11 20:04:00 host sshd[7204]: Received disconnect from 211.44.212.27 port 43022:11: Bye Bye [preauth] Jan 11 20:04:00 host sshd[7204]: Disconnected from 211.44.212.27 port 43022 [preauth] Jan 11 20:04:00 host sshd[7210]: User root from 189.146.156.190 not allowed because not listed in AllowUsers Jan 11 20:04:00 host sshd[7210]: input_userauth_request: invalid user root [preauth] Jan 11 20:04:01 host unix_chkpwd[7214]: password check failed for user (root) Jan 11 20:04:01 host sshd[7210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.146.156.190 user=root Jan 11 20:04:01 host sshd[7210]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:04:01 host sshd[7207]: Failed password for invalid user root from 43.157.7.25 port 36510 ssh2 Jan 11 20:04:01 host sshd[7207]: Received disconnect from 43.157.7.25 port 36510:11: Bye Bye [preauth] Jan 11 20:04:01 host sshd[7207]: Disconnected from 43.157.7.25 port 36510 [preauth] Jan 11 20:04:02 host sshd[7210]: Failed password for invalid user root from 189.146.156.190 port 54416 ssh2 Jan 11 20:04:03 host sshd[7210]: Received disconnect from 189.146.156.190 port 54416:11: Bye Bye [preauth] Jan 11 20:04:03 host sshd[7210]: Disconnected from 189.146.156.190 port 54416 [preauth] Jan 11 20:04:26 host sshd[7357]: User root from 146.148.67.133 not allowed because not listed in AllowUsers Jan 11 20:04:26 host sshd[7357]: input_userauth_request: invalid user root [preauth] Jan 11 20:04:26 host unix_chkpwd[7368]: password check failed for user (root) Jan 11 20:04:26 host sshd[7357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.148.67.133 user=root Jan 11 20:04:26 host sshd[7357]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:04:29 host sshd[7357]: Failed password for invalid user root from 146.148.67.133 port 35360 ssh2 Jan 11 20:04:29 host sshd[7357]: Received disconnect from 146.148.67.133 port 35360:11: Bye Bye [preauth] Jan 11 20:04:29 host sshd[7357]: Disconnected from 146.148.67.133 port 35360 [preauth] Jan 11 20:04:39 host sshd[7405]: User root from 174.138.64.63 not allowed because not listed in AllowUsers Jan 11 20:04:39 host sshd[7405]: input_userauth_request: invalid user root [preauth] Jan 11 20:04:39 host unix_chkpwd[7408]: password check failed for user (root) Jan 11 20:04:39 host sshd[7405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.64.63 user=root Jan 11 20:04:39 host sshd[7405]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:04:41 host sshd[7405]: Failed password for invalid user root from 174.138.64.63 port 60562 ssh2 Jan 11 20:04:41 host sshd[7405]: Received disconnect from 174.138.64.63 port 60562:11: Bye Bye [preauth] Jan 11 20:04:41 host sshd[7405]: Disconnected from 174.138.64.63 port 60562 [preauth] Jan 11 20:06:51 host sshd[7650]: User root from 183.83.49.121 not allowed because not listed in AllowUsers Jan 11 20:06:51 host sshd[7650]: input_userauth_request: invalid user root [preauth] Jan 11 20:06:51 host unix_chkpwd[7652]: password check failed for user (root) Jan 11 20:06:51 host sshd[7650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.83.49.121 user=root Jan 11 20:06:51 host sshd[7650]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:06:54 host sshd[7650]: Failed password for invalid user root from 183.83.49.121 port 51738 ssh2 Jan 11 20:06:54 host sshd[7650]: Received disconnect from 183.83.49.121 port 51738:11: Bye Bye [preauth] Jan 11 20:06:54 host sshd[7650]: Disconnected from 183.83.49.121 port 51738 [preauth] Jan 11 20:08:15 host sshd[7796]: User root from 139.59.102.10 not allowed because not listed in AllowUsers Jan 11 20:08:15 host sshd[7796]: input_userauth_request: invalid user root [preauth] Jan 11 20:08:15 host unix_chkpwd[7798]: password check failed for user (root) Jan 11 20:08:15 host sshd[7796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.102.10 user=root Jan 11 20:08:15 host sshd[7796]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:08:17 host sshd[7796]: Failed password for invalid user root from 139.59.102.10 port 60500 ssh2 Jan 11 20:08:17 host sshd[7796]: Received disconnect from 139.59.102.10 port 60500:11: Bye Bye [preauth] Jan 11 20:08:17 host sshd[7796]: Disconnected from 139.59.102.10 port 60500 [preauth] Jan 11 20:08:37 host sshd[7856]: User root from 146.148.67.133 not allowed because not listed in AllowUsers Jan 11 20:08:37 host sshd[7856]: input_userauth_request: invalid user root [preauth] Jan 11 20:08:37 host unix_chkpwd[7862]: password check failed for user (root) Jan 11 20:08:37 host sshd[7856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.148.67.133 user=root Jan 11 20:08:37 host sshd[7856]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:08:39 host sshd[7856]: Failed password for invalid user root from 146.148.67.133 port 49720 ssh2 Jan 11 20:08:39 host sshd[7856]: Received disconnect from 146.148.67.133 port 49720:11: Bye Bye [preauth] Jan 11 20:08:39 host sshd[7856]: Disconnected from 146.148.67.133 port 49720 [preauth] Jan 11 20:09:00 host sshd[7929]: User root from 189.146.156.190 not allowed because not listed in AllowUsers Jan 11 20:09:00 host sshd[7929]: input_userauth_request: invalid user root [preauth] Jan 11 20:09:00 host unix_chkpwd[7932]: password check failed for user (root) Jan 11 20:09:00 host sshd[7929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.146.156.190 user=root Jan 11 20:09:00 host sshd[7929]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:09:01 host sshd[7933]: User root from 174.138.64.63 not allowed because not listed in AllowUsers Jan 11 20:09:01 host sshd[7933]: input_userauth_request: invalid user root [preauth] Jan 11 20:09:01 host unix_chkpwd[7946]: password check failed for user (root) Jan 11 20:09:01 host sshd[7933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.64.63 user=root Jan 11 20:09:01 host sshd[7933]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:09:02 host sshd[7929]: Failed password for invalid user root from 189.146.156.190 port 50472 ssh2 Jan 11 20:09:03 host sshd[7933]: Failed password for invalid user root from 174.138.64.63 port 43178 ssh2 Jan 11 20:09:03 host sshd[7933]: Received disconnect from 174.138.64.63 port 43178:11: Bye Bye [preauth] Jan 11 20:09:03 host sshd[7933]: Disconnected from 174.138.64.63 port 43178 [preauth] Jan 11 20:09:26 host sshd[8141]: User root from 24.173.203.83 not allowed because not listed in AllowUsers Jan 11 20:09:26 host sshd[8141]: input_userauth_request: invalid user root [preauth] Jan 11 20:09:26 host unix_chkpwd[8145]: password check failed for user (root) Jan 11 20:09:26 host sshd[8141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.173.203.83 user=root Jan 11 20:09:26 host sshd[8141]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:09:28 host sshd[8141]: Failed password for invalid user root from 24.173.203.83 port 35150 ssh2 Jan 11 20:09:36 host sshd[8218]: User root from 43.157.7.25 not allowed because not listed in AllowUsers Jan 11 20:09:36 host sshd[8218]: input_userauth_request: invalid user root [preauth] Jan 11 20:09:36 host unix_chkpwd[8222]: password check failed for user (root) Jan 11 20:09:36 host sshd[8218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.7.25 user=root Jan 11 20:09:36 host sshd[8218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:09:37 host sshd[8218]: Failed password for invalid user root from 43.157.7.25 port 34694 ssh2 Jan 11 20:09:51 host sshd[8278]: User root from 183.83.49.121 not allowed because not listed in AllowUsers Jan 11 20:09:51 host sshd[8278]: input_userauth_request: invalid user root [preauth] Jan 11 20:09:51 host unix_chkpwd[8280]: password check failed for user (root) Jan 11 20:09:51 host sshd[8278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.83.49.121 user=root Jan 11 20:09:51 host sshd[8278]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:09:53 host sshd[8278]: Failed password for invalid user root from 183.83.49.121 port 38228 ssh2 Jan 11 20:09:54 host sshd[8278]: Received disconnect from 183.83.49.121 port 38228:11: Bye Bye [preauth] Jan 11 20:09:54 host sshd[8278]: Disconnected from 183.83.49.121 port 38228 [preauth] Jan 11 20:09:56 host sshd[8286]: User root from 177.93.51.98 not allowed because not listed in AllowUsers Jan 11 20:09:56 host sshd[8286]: input_userauth_request: invalid user root [preauth] Jan 11 20:09:56 host unix_chkpwd[8309]: password check failed for user (root) Jan 11 20:09:56 host sshd[8286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.93.51.98 user=root Jan 11 20:09:56 host sshd[8286]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:09:59 host sshd[8286]: Failed password for invalid user root from 177.93.51.98 port 39316 ssh2 Jan 11 20:09:59 host sshd[8286]: Received disconnect from 177.93.51.98 port 39316:11: Bye Bye [preauth] Jan 11 20:09:59 host sshd[8286]: Disconnected from 177.93.51.98 port 39316 [preauth] Jan 11 20:10:02 host sshd[8347]: User root from 139.59.102.10 not allowed because not listed in AllowUsers Jan 11 20:10:02 host sshd[8347]: input_userauth_request: invalid user root [preauth] Jan 11 20:10:02 host unix_chkpwd[8351]: password check failed for user (root) Jan 11 20:10:02 host sshd[8347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.102.10 user=root Jan 11 20:10:02 host sshd[8347]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:10:04 host sshd[8347]: Failed password for invalid user root from 139.59.102.10 port 34052 ssh2 Jan 11 20:10:04 host sshd[8347]: Received disconnect from 139.59.102.10 port 34052:11: Bye Bye [preauth] Jan 11 20:10:04 host sshd[8347]: Disconnected from 139.59.102.10 port 34052 [preauth] Jan 11 20:11:31 host sshd[8551]: User root from 211.44.212.27 not allowed because not listed in AllowUsers Jan 11 20:11:31 host sshd[8551]: input_userauth_request: invalid user root [preauth] Jan 11 20:11:31 host unix_chkpwd[8554]: password check failed for user (root) Jan 11 20:11:31 host sshd[8551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.44.212.27 user=root Jan 11 20:11:31 host sshd[8551]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:11:33 host sshd[8551]: Failed password for invalid user root from 211.44.212.27 port 41444 ssh2 Jan 11 20:14:13 host sshd[8946]: User root from 165.227.228.72 not allowed because not listed in AllowUsers Jan 11 20:14:13 host sshd[8946]: input_userauth_request: invalid user root [preauth] Jan 11 20:14:13 host unix_chkpwd[8949]: password check failed for user (root) Jan 11 20:14:13 host sshd[8946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.228.72 user=root Jan 11 20:14:13 host sshd[8946]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:14:14 host sshd[8946]: Failed password for invalid user root from 165.227.228.72 port 60626 ssh2 Jan 11 20:14:15 host sshd[8946]: Received disconnect from 165.227.228.72 port 60626:11: Bye Bye [preauth] Jan 11 20:14:15 host sshd[8946]: Disconnected from 165.227.228.72 port 60626 [preauth] Jan 11 20:15:23 host sshd[9078]: User root from 221.215.48.75 not allowed because not listed in AllowUsers Jan 11 20:15:23 host sshd[9078]: input_userauth_request: invalid user root [preauth] Jan 11 20:15:23 host unix_chkpwd[9081]: password check failed for user (root) Jan 11 20:15:23 host sshd[9078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.215.48.75 user=root Jan 11 20:15:23 host sshd[9078]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:15:25 host sshd[9078]: Failed password for invalid user root from 221.215.48.75 port 23000 ssh2 Jan 11 20:15:25 host sshd[9078]: Received disconnect from 221.215.48.75 port 23000:11: Bye Bye [preauth] Jan 11 20:15:25 host sshd[9078]: Disconnected from 221.215.48.75 port 23000 [preauth] Jan 11 20:15:58 host sshd[9187]: User root from 165.227.228.72 not allowed because not listed in AllowUsers Jan 11 20:15:58 host sshd[9187]: input_userauth_request: invalid user root [preauth] Jan 11 20:15:58 host unix_chkpwd[9190]: password check failed for user (root) Jan 11 20:15:58 host sshd[9187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.228.72 user=root Jan 11 20:15:58 host sshd[9187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:16:01 host sshd[9187]: Failed password for invalid user root from 165.227.228.72 port 59902 ssh2 Jan 11 20:16:01 host sshd[9187]: Received disconnect from 165.227.228.72 port 59902:11: Bye Bye [preauth] Jan 11 20:16:01 host sshd[9187]: Disconnected from 165.227.228.72 port 59902 [preauth] Jan 11 20:16:59 host sshd[9344]: User root from 61.146.48.118 not allowed because not listed in AllowUsers Jan 11 20:16:59 host sshd[9344]: input_userauth_request: invalid user root [preauth] Jan 11 20:17:00 host unix_chkpwd[9359]: password check failed for user (root) Jan 11 20:17:00 host sshd[9344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.146.48.118 user=root Jan 11 20:17:00 host sshd[9344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:17:02 host sshd[9344]: Failed password for invalid user root from 61.146.48.118 port 61153 ssh2 Jan 11 20:17:03 host unix_chkpwd[9378]: password check failed for user (root) Jan 11 20:17:03 host sshd[9344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:17:05 host sshd[9344]: Failed password for invalid user root from 61.146.48.118 port 61153 ssh2 Jan 11 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=wwwresourcehunte user-4=keralaholi user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=cochintaxi user-11=wwwkaretakers user-12=wwwnexidigital user-13=mrsclean user-14=kottayamcalldriv user-15=phmetals user-16=gifterman user-17=palco123 user-18=wwwletsstalkfood user-19=straightcurve user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=woodpeck user-27=wwwkapin user-28=wwwkmaorg user-29=disposeat user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 20:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-paOaEAXBxUSY4QZ5.~ Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-paOaEAXBxUSY4QZ5.~' Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-paOaEAXBxUSY4QZ5.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 20:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 20:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 20:22:26 host sshd[10390]: User root from 178.219.117.78 not allowed because not listed in AllowUsers Jan 11 20:22:26 host sshd[10390]: input_userauth_request: invalid user root [preauth] Jan 11 20:22:26 host sshd[10390]: Failed none for invalid user root from 178.219.117.78 port 57911 ssh2 Jan 11 20:22:27 host sshd[10390]: Connection closed by 178.219.117.78 port 57911 [preauth] Jan 11 20:35:48 host sshd[12114]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 11 20:35:48 host sshd[12114]: input_userauth_request: invalid user root [preauth] Jan 11 20:35:48 host unix_chkpwd[12118]: password check failed for user (root) Jan 11 20:35:48 host sshd[12114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 11 20:35:48 host sshd[12114]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 20:35:50 host sshd[12114]: Failed password for invalid user root from 195.226.194.142 port 52472 ssh2 Jan 11 20:35:50 host sshd[12114]: Received disconnect from 195.226.194.142 port 52472:11: Bye Bye [preauth] Jan 11 20:35:50 host sshd[12114]: Disconnected from 195.226.194.142 port 52472 [preauth] Jan 11 20:49:23 host sshd[13934]: Did not receive identification string from 186.67.77.26 port 25239 Jan 11 20:49:43 host sshd[13987]: Invalid user pi from 176.111.173.164 port 59616 Jan 11 20:49:43 host sshd[13987]: input_userauth_request: invalid user pi [preauth] Jan 11 20:49:43 host sshd[13987]: pam_unix(sshd:auth): check pass; user unknown Jan 11 20:49:43 host sshd[13987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.111.173.164 Jan 11 20:49:45 host sshd[13987]: Failed password for invalid user pi from 176.111.173.164 port 59616 ssh2 Jan 11 20:49:48 host sshd[13987]: pam_unix(sshd:auth): check pass; user unknown Jan 11 20:49:51 host sshd[13987]: Failed password for invalid user pi from 176.111.173.164 port 59616 ssh2 Jan 11 20:49:54 host sshd[13987]: pam_unix(sshd:auth): check pass; user unknown Jan 11 20:49:55 host sshd[13987]: Failed password for invalid user pi from 176.111.173.164 port 59616 ssh2 Jan 11 20:49:59 host sshd[13987]: pam_unix(sshd:auth): check pass; user unknown Jan 11 20:50:01 host sshd[13987]: Failed password for invalid user pi from 176.111.173.164 port 59616 ssh2 Jan 11 21:01:31 host sshd[15665]: Invalid user cq from 194.110.203.109 port 43612 Jan 11 21:01:31 host sshd[15665]: input_userauth_request: invalid user cq [preauth] Jan 11 21:01:31 host sshd[15665]: pam_unix(sshd:auth): check pass; user unknown Jan 11 21:01:31 host sshd[15665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 21:01:33 host sshd[15665]: Failed password for invalid user cq from 194.110.203.109 port 43612 ssh2 Jan 11 21:01:37 host sshd[15665]: pam_unix(sshd:auth): check pass; user unknown Jan 11 21:01:38 host sshd[15665]: Failed password for invalid user cq from 194.110.203.109 port 43612 ssh2 Jan 11 21:01:42 host sshd[15665]: pam_unix(sshd:auth): check pass; user unknown Jan 11 21:01:43 host sshd[15665]: Failed password for invalid user cq from 194.110.203.109 port 43612 ssh2 Jan 11 21:01:46 host sshd[15665]: Connection closed by 194.110.203.109 port 43612 [preauth] Jan 11 21:01:46 host sshd[15665]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 21:02:23 host sshd[15772]: User root from 219.147.91.9 not allowed because not listed in AllowUsers Jan 11 21:02:23 host sshd[15772]: input_userauth_request: invalid user root [preauth] Jan 11 21:02:24 host unix_chkpwd[15780]: password check failed for user (root) Jan 11 21:02:24 host sshd[15772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.147.91.9 user=root Jan 11 21:02:24 host sshd[15772]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 21:02:26 host sshd[15772]: Failed password for invalid user root from 219.147.91.9 port 50872 ssh2 Jan 11 21:02:27 host sshd[15772]: Connection closed by 219.147.91.9 port 50872 [preauth] Jan 11 21:10:58 host sshd[17095]: Did not receive identification string from 172.105.96.215 port 31512 Jan 11 21:11:11 host sshd[17124]: Invalid user EZsetup from 104.244.74.6 port 49646 Jan 11 21:11:11 host sshd[17124]: input_userauth_request: invalid user EZsetup [preauth] Jan 11 21:11:11 host sshd[17124]: pam_unix(sshd:auth): check pass; user unknown Jan 11 21:11:11 host sshd[17124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 11 21:11:13 host sshd[17124]: Failed password for invalid user EZsetup from 104.244.74.6 port 49646 ssh2 Jan 11 21:11:13 host sshd[17124]: Connection closed by 104.244.74.6 port 49646 [preauth] Jan 11 21:15:10 host sshd[17679]: Invalid user EZsetup from 104.244.74.6 port 34980 Jan 11 21:15:10 host sshd[17679]: input_userauth_request: invalid user EZsetup [preauth] Jan 11 21:15:10 host sshd[17679]: pam_unix(sshd:auth): check pass; user unknown Jan 11 21:15:10 host sshd[17679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 11 21:15:13 host sshd[17679]: Failed password for invalid user EZsetup from 104.244.74.6 port 34980 ssh2 Jan 11 21:15:13 host sshd[17679]: Connection closed by 104.244.74.6 port 34980 [preauth] Jan 11 21:21:43 host sshd[18661]: Did not receive identification string from 113.214.1.10 port 55283 Jan 11 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=wwwkapin user-6=woodpeck user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=mrsclean user-11=wwwnexidigital user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=wwwresourcehunte user-26=keralaholi user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 21:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZZdl7DJV4JGi4OHa.~ Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZZdl7DJV4JGi4OHa.~' Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZZdl7DJV4JGi4OHa.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 21:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 21:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 21:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 21:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 21:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 21:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 21:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 21:22:09 host sshd[18874]: Invalid user 1234 from 67.164.238.39 port 50080 Jan 11 21:22:09 host sshd[18874]: input_userauth_request: invalid user 1234 [preauth] Jan 11 21:22:10 host sshd[18874]: pam_unix(sshd:auth): check pass; user unknown Jan 11 21:22:10 host sshd[18874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.164.238.39 Jan 11 21:22:12 host sshd[18874]: Failed password for invalid user 1234 from 67.164.238.39 port 50080 ssh2 Jan 11 21:22:12 host sshd[18874]: Connection closed by 67.164.238.39 port 50080 [preauth] Jan 11 21:34:13 host sshd[20458]: Did not receive identification string from 85.31.46.253 port 56718 Jan 11 21:35:44 host sshd[20651]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 11 21:35:44 host sshd[20651]: input_userauth_request: invalid user root [preauth] Jan 11 21:35:44 host unix_chkpwd[20654]: password check failed for user (root) Jan 11 21:35:44 host sshd[20651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 11 21:35:44 host sshd[20651]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 21:35:46 host sshd[20651]: Failed password for invalid user root from 195.226.194.142 port 26616 ssh2 Jan 11 21:42:13 host sshd[21485]: Invalid user admin from 207.136.6.114 port 36697 Jan 11 21:42:13 host sshd[21485]: input_userauth_request: invalid user admin [preauth] Jan 11 21:42:14 host sshd[21485]: pam_unix(sshd:auth): check pass; user unknown Jan 11 21:42:14 host sshd[21485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.136.6.114 Jan 11 21:42:16 host sshd[21485]: Failed password for invalid user admin from 207.136.6.114 port 36697 ssh2 Jan 11 21:42:16 host sshd[21485]: Connection closed by 207.136.6.114 port 36697 [preauth] Jan 11 21:44:53 host sshd[21793]: Invalid user EZsetup from 104.244.74.6 port 39806 Jan 11 21:44:53 host sshd[21793]: input_userauth_request: invalid user EZsetup [preauth] Jan 11 21:44:53 host sshd[21793]: pam_unix(sshd:auth): check pass; user unknown Jan 11 21:44:53 host sshd[21793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 11 21:44:55 host sshd[21793]: Failed password for invalid user EZsetup from 104.244.74.6 port 39806 ssh2 Jan 11 21:44:55 host sshd[21793]: Connection closed by 104.244.74.6 port 39806 [preauth] Jan 11 21:46:07 host sshd[22041]: Connection closed by 169.228.66.212 port 56000 [preauth] Jan 11 21:52:39 host sshd[22898]: Invalid user rodopi from 205.185.113.129 port 46304 Jan 11 21:52:39 host sshd[22898]: input_userauth_request: invalid user rodopi [preauth] Jan 11 21:52:39 host sshd[22898]: pam_unix(sshd:auth): check pass; user unknown Jan 11 21:52:39 host sshd[22898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 11 21:52:41 host sshd[22898]: Failed password for invalid user rodopi from 205.185.113.129 port 46304 ssh2 Jan 11 21:52:41 host sshd[22898]: Connection closed by 205.185.113.129 port 46304 [preauth] Jan 11 22:02:24 host sshd[24086]: Connection closed by 113.161.57.75 port 38534 [preauth] Jan 11 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=remysagr user-9=wwwkmaorg user-10=wwwnexidigital user-11=mrsclean user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=cochintaxi user-24=wwwkaretakers user-25=wwwrmswll user-26=keralaholi user-27=wwwresourcehunte user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 22:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SM3WM3rnoqLTZQcp.~ Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SM3WM3rnoqLTZQcp.~' Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SM3WM3rnoqLTZQcp.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 22:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 22:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 22:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 22:22:04 host sshd[27560]: Invalid user admin from 95.67.97.210 port 48637 Jan 11 22:22:04 host sshd[27560]: input_userauth_request: invalid user admin [preauth] Jan 11 22:22:04 host sshd[27560]: pam_unix(sshd:auth): check pass; user unknown Jan 11 22:22:04 host sshd[27560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.67.97.210 Jan 11 22:22:07 host sshd[27560]: Failed password for invalid user admin from 95.67.97.210 port 48637 ssh2 Jan 11 22:22:07 host sshd[27560]: Connection closed by 95.67.97.210 port 48637 [preauth] Jan 11 22:27:57 host sshd[28453]: Invalid user martin from 107.189.30.59 port 58788 Jan 11 22:27:57 host sshd[28453]: input_userauth_request: invalid user martin [preauth] Jan 11 22:27:57 host sshd[28453]: pam_unix(sshd:auth): check pass; user unknown Jan 11 22:27:57 host sshd[28453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 11 22:27:59 host sshd[28453]: Failed password for invalid user martin from 107.189.30.59 port 58788 ssh2 Jan 11 22:28:00 host sshd[28453]: Connection closed by 107.189.30.59 port 58788 [preauth] Jan 11 22:40:33 host sshd[30193]: Did not receive identification string from 46.101.97.107 port 61000 Jan 11 22:42:48 host sshd[30469]: Did not receive identification string from 41.215.215.69 port 50808 Jan 11 22:43:04 host sshd[30590]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 11 22:43:04 host sshd[30590]: input_userauth_request: invalid user root [preauth] Jan 11 22:43:05 host unix_chkpwd[30593]: password check failed for user (root) Jan 11 22:43:05 host sshd[30590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 11 22:43:05 host sshd[30590]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 22:43:06 host sshd[30590]: Failed password for invalid user root from 209.141.55.27 port 40196 ssh2 Jan 11 22:43:07 host sshd[30590]: Received disconnect from 209.141.55.27 port 40196:11: Normal Shutdown, Thank you for playing [preauth] Jan 11 22:43:07 host sshd[30590]: Disconnected from 209.141.55.27 port 40196 [preauth] Jan 11 22:43:52 host sshd[30675]: Did not receive identification string from 85.31.46.253 port 43694 Jan 11 22:52:06 host sshd[31845]: Connection reset by 106.13.29.110 port 45942 [preauth] Jan 11 22:56:45 host sshd[32447]: Invalid user cr from 194.110.203.109 port 40738 Jan 11 22:56:45 host sshd[32447]: input_userauth_request: invalid user cr [preauth] Jan 11 22:56:45 host sshd[32447]: pam_unix(sshd:auth): check pass; user unknown Jan 11 22:56:45 host sshd[32447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 22:56:47 host sshd[32447]: Failed password for invalid user cr from 194.110.203.109 port 40738 ssh2 Jan 11 22:56:50 host sshd[32447]: pam_unix(sshd:auth): check pass; user unknown Jan 11 22:56:52 host sshd[32447]: Failed password for invalid user cr from 194.110.203.109 port 40738 ssh2 Jan 11 22:56:55 host sshd[32447]: pam_unix(sshd:auth): check pass; user unknown Jan 11 22:56:58 host sshd[32447]: Failed password for invalid user cr from 194.110.203.109 port 40738 ssh2 Jan 11 22:57:01 host sshd[32447]: Connection closed by 194.110.203.109 port 40738 [preauth] Jan 11 22:57:01 host sshd[32447]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 11 23:02:21 host sshd[785]: Invalid user squid from 65.20.128.77 port 43408 Jan 11 23:02:21 host sshd[785]: input_userauth_request: invalid user squid [preauth] Jan 11 23:02:23 host sshd[785]: pam_unix(sshd:auth): check pass; user unknown Jan 11 23:02:23 host sshd[785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.20.128.77 Jan 11 23:02:25 host sshd[785]: Failed password for invalid user squid from 65.20.128.77 port 43408 ssh2 Jan 11 23:02:30 host sshd[785]: Connection closed by 65.20.128.77 port 43408 [preauth] Jan 11 23:16:10 host sshd[2823]: Invalid user admin from 220.134.69.71 port 39048 Jan 11 23:16:10 host sshd[2823]: input_userauth_request: invalid user admin [preauth] Jan 11 23:16:10 host sshd[2823]: Failed none for invalid user admin from 220.134.69.71 port 39048 ssh2 Jan 11 23:16:11 host sshd[2823]: pam_unix(sshd:auth): check pass; user unknown Jan 11 23:16:11 host sshd[2823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.69.71 Jan 11 23:16:12 host sshd[2823]: Failed password for invalid user admin from 220.134.69.71 port 39048 ssh2 Jan 11 23:16:12 host sshd[2823]: pam_unix(sshd:auth): check pass; user unknown Jan 11 23:16:14 host sshd[2823]: Failed password for invalid user admin from 220.134.69.71 port 39048 ssh2 Jan 11 23:16:15 host sshd[2823]: pam_unix(sshd:auth): check pass; user unknown Jan 11 23:16:17 host sshd[2823]: Failed password for invalid user admin from 220.134.69.71 port 39048 ssh2 Jan 11 23:16:17 host sshd[2823]: pam_unix(sshd:auth): check pass; user unknown Jan 11 23:16:19 host sshd[2823]: Failed password for invalid user admin from 220.134.69.71 port 39048 ssh2 Jan 11 23:16:19 host sshd[2823]: pam_unix(sshd:auth): check pass; user unknown Jan 11 23:16:22 host sshd[2823]: Failed password for invalid user admin from 220.134.69.71 port 39048 ssh2 Jan 11 23:16:22 host sshd[2823]: error: maximum authentication attempts exceeded for invalid user admin from 220.134.69.71 port 39048 ssh2 [preauth] Jan 11 23:16:22 host sshd[2823]: Disconnecting: Too many authentication failures [preauth] Jan 11 23:16:22 host sshd[2823]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.69.71 Jan 11 23:16:22 host sshd[2823]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 11 23:16:22 host sshd[2838]: Did not receive identification string from 220.134.69.71 port 39127 Jan 11 23:20:26 host sshd[3500]: Did not receive identification string from 192.241.210.51 port 34668 Jan 11 23:21:55 host sshd[3704]: User root from 123.202.209.218 not allowed because not listed in AllowUsers Jan 11 23:21:55 host sshd[3704]: input_userauth_request: invalid user root [preauth] Jan 11 23:21:55 host unix_chkpwd[3710]: password check failed for user (root) Jan 11 23:21:55 host sshd[3704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.202.209.218 user=root Jan 11 23:21:55 host sshd[3704]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:58 host sshd[3704]: Failed password for invalid user root from 123.202.209.218 port 57267 ssh2 Jan 11 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:58 host sshd[3704]: Connection closed by 123.202.209.218 port 57267 [preauth] Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=wwwevmhonda user-15=bonifacegroup user-16=mrsclean user-17=wwwnexidigital user-18=phmetals user-19=kottayamcalldriv user-20=palco123 user-21=gifterman user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=shalinijames user-29=wwwtestugo user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 11 23:21:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PUhTwUfDV8wtVKSt.~ Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PUhTwUfDV8wtVKSt.~' Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PUhTwUfDV8wtVKSt.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 11 23:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 11 23:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 11 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 11 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 11 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 11 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 11 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 11 23:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 11 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 11 23:28:52 host sshd[4921]: Did not receive identification string from 85.31.46.253 port 36390 Jan 11 23:41:39 host sshd[6618]: User ftp from 195.242.233.213 not allowed because not listed in AllowUsers Jan 11 23:41:39 host sshd[6618]: input_userauth_request: invalid user ftp [preauth] Jan 11 23:41:39 host unix_chkpwd[6623]: password check failed for user (ftp) Jan 11 23:41:39 host sshd[6618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.242.233.213 user=ftp Jan 11 23:41:39 host sshd[6618]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 11 23:41:42 host sshd[6618]: Failed password for invalid user ftp from 195.242.233.213 port 56651 ssh2 Jan 11 23:41:42 host sshd[6618]: Connection closed by 195.242.233.213 port 56651 [preauth] Jan 11 23:48:32 host sshd[7588]: User root from 201.147.152.203 not allowed because not listed in AllowUsers Jan 11 23:48:32 host sshd[7588]: input_userauth_request: invalid user root [preauth] Jan 11 23:48:32 host unix_chkpwd[7598]: password check failed for user (root) Jan 11 23:48:32 host sshd[7588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.147.152.203 user=root Jan 11 23:48:32 host sshd[7588]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 23:48:34 host sshd[7588]: Failed password for invalid user root from 201.147.152.203 port 58688 ssh2 Jan 11 23:48:34 host sshd[7588]: Received disconnect from 201.147.152.203 port 58688:11: Bye Bye [preauth] Jan 11 23:48:34 host sshd[7588]: Disconnected from 201.147.152.203 port 58688 [preauth] Jan 11 23:53:57 host sshd[8213]: User root from 201.147.152.203 not allowed because not listed in AllowUsers Jan 11 23:53:57 host sshd[8213]: input_userauth_request: invalid user root [preauth] Jan 11 23:53:57 host unix_chkpwd[8224]: password check failed for user (root) Jan 11 23:53:57 host sshd[8213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.147.152.203 user=root Jan 11 23:53:57 host sshd[8213]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 11 23:53:59 host sshd[8213]: Failed password for invalid user root from 201.147.152.203 port 58926 ssh2 Jan 11 23:53:59 host sshd[8213]: Received disconnect from 201.147.152.203 port 58926:11: Bye Bye [preauth] Jan 11 23:53:59 host sshd[8213]: Disconnected from 201.147.152.203 port 58926 [preauth] Jan 12 00:12:29 host sshd[10711]: Connection closed by 45.79.128.205 port 43944 [preauth] Jan 12 00:12:31 host sshd[10736]: Connection closed by 45.79.128.205 port 43952 [preauth] Jan 12 00:12:34 host sshd[10740]: Connection closed by 45.79.128.205 port 43964 [preauth] Jan 12 00:13:04 host sshd[10795]: Did not receive identification string from 85.31.46.253 port 48186 Jan 12 00:18:36 host sshd[12417]: User root from 106.51.72.221 not allowed because not listed in AllowUsers Jan 12 00:18:36 host sshd[12417]: input_userauth_request: invalid user root [preauth] Jan 12 00:18:36 host unix_chkpwd[12420]: password check failed for user (root) Jan 12 00:18:36 host sshd[12417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.72.221 user=root Jan 12 00:18:36 host sshd[12417]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:18:38 host sshd[12417]: Failed password for invalid user root from 106.51.72.221 port 37518 ssh2 Jan 12 00:18:38 host sshd[12417]: Received disconnect from 106.51.72.221 port 37518:11: Bye Bye [preauth] Jan 12 00:18:38 host sshd[12417]: Disconnected from 106.51.72.221 port 37518 [preauth] Jan 12 00:18:53 host sshd[12435]: Connection closed by 174.138.61.44 port 42922 [preauth] Jan 12 00:20:32 host sshd[12726]: Invalid user admin from 95.35.31.118 port 50329 Jan 12 00:20:32 host sshd[12726]: input_userauth_request: invalid user admin [preauth] Jan 12 00:20:33 host sshd[12726]: pam_unix(sshd:auth): check pass; user unknown Jan 12 00:20:33 host sshd[12726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.35.31.118 Jan 12 00:20:35 host sshd[12726]: Failed password for invalid user admin from 95.35.31.118 port 50329 ssh2 Jan 12 00:20:35 host sshd[12726]: Connection closed by 95.35.31.118 port 50329 [preauth] Jan 12 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=kottayamcalldriv user-6=phmetals user-7=palco123 user-8=gifterman user-9=mrsclean user-10=wwwnexidigital user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=keralaholi user-24=wwwresourcehunte user-25=wwwrmswll user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 00:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J33N3I0F1aVmxQ92.~ Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J33N3I0F1aVmxQ92.~' Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J33N3I0F1aVmxQ92.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 00:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 00:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 00:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 00:24:57 host sshd[13519]: User root from 106.51.72.221 not allowed because not listed in AllowUsers Jan 12 00:24:57 host sshd[13519]: input_userauth_request: invalid user root [preauth] Jan 12 00:24:57 host unix_chkpwd[13521]: password check failed for user (root) Jan 12 00:24:57 host sshd[13519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.72.221 user=root Jan 12 00:24:57 host sshd[13519]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:25:00 host sshd[13519]: Failed password for invalid user root from 106.51.72.221 port 38280 ssh2 Jan 12 00:25:00 host sshd[13519]: Received disconnect from 106.51.72.221 port 38280:11: Bye Bye [preauth] Jan 12 00:25:00 host sshd[13519]: Disconnected from 106.51.72.221 port 38280 [preauth] Jan 12 00:25:15 host sshd[13612]: User root from 172.247.194.148 not allowed because not listed in AllowUsers Jan 12 00:25:15 host sshd[13612]: input_userauth_request: invalid user root [preauth] Jan 12 00:25:15 host unix_chkpwd[13615]: password check failed for user (root) Jan 12 00:25:15 host sshd[13612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.247.194.148 user=root Jan 12 00:25:15 host sshd[13612]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:25:17 host sshd[13612]: Failed password for invalid user root from 172.247.194.148 port 45409 ssh2 Jan 12 00:25:18 host sshd[13612]: Received disconnect from 172.247.194.148 port 45409:11: Bye Bye [preauth] Jan 12 00:25:18 host sshd[13612]: Disconnected from 172.247.194.148 port 45409 [preauth] Jan 12 00:28:34 host sshd[14080]: User root from 27.254.149.199 not allowed because not listed in AllowUsers Jan 12 00:28:34 host sshd[14080]: input_userauth_request: invalid user root [preauth] Jan 12 00:28:34 host unix_chkpwd[14082]: password check failed for user (root) Jan 12 00:28:34 host sshd[14080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.149.199 user=root Jan 12 00:28:34 host sshd[14080]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:28:36 host sshd[14080]: Failed password for invalid user root from 27.254.149.199 port 35036 ssh2 Jan 12 00:28:36 host sshd[14080]: Received disconnect from 27.254.149.199 port 35036:11: Bye Bye [preauth] Jan 12 00:28:36 host sshd[14080]: Disconnected from 27.254.149.199 port 35036 [preauth] Jan 12 00:29:47 host sshd[14199]: User root from 118.34.14.126 not allowed because not listed in AllowUsers Jan 12 00:29:47 host sshd[14199]: input_userauth_request: invalid user root [preauth] Jan 12 00:29:47 host unix_chkpwd[14202]: password check failed for user (root) Jan 12 00:29:47 host sshd[14199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.14.126 user=root Jan 12 00:29:47 host sshd[14199]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:29:49 host sshd[14199]: Failed password for invalid user root from 118.34.14.126 port 53106 ssh2 Jan 12 00:29:49 host sshd[14199]: Received disconnect from 118.34.14.126 port 53106:11: Bye Bye [preauth] Jan 12 00:29:49 host sshd[14199]: Disconnected from 118.34.14.126 port 53106 [preauth] Jan 12 00:32:29 host sshd[14525]: User root from 172.247.194.148 not allowed because not listed in AllowUsers Jan 12 00:32:29 host sshd[14525]: input_userauth_request: invalid user root [preauth] Jan 12 00:32:29 host unix_chkpwd[14549]: password check failed for user (root) Jan 12 00:32:29 host sshd[14525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.247.194.148 user=root Jan 12 00:32:29 host sshd[14525]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:32:32 host sshd[14525]: Failed password for invalid user root from 172.247.194.148 port 38323 ssh2 Jan 12 00:32:32 host sshd[14525]: Received disconnect from 172.247.194.148 port 38323:11: Bye Bye [preauth] Jan 12 00:32:32 host sshd[14525]: Disconnected from 172.247.194.148 port 38323 [preauth] Jan 12 00:32:55 host sshd[14703]: User root from 118.201.79.222 not allowed because not listed in AllowUsers Jan 12 00:32:55 host sshd[14703]: input_userauth_request: invalid user root [preauth] Jan 12 00:32:55 host unix_chkpwd[14705]: password check failed for user (root) Jan 12 00:32:55 host sshd[14703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.201.79.222 user=root Jan 12 00:32:55 host sshd[14703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:32:58 host sshd[14703]: Failed password for invalid user root from 118.201.79.222 port 43195 ssh2 Jan 12 00:32:58 host sshd[14703]: Received disconnect from 118.201.79.222 port 43195:11: Bye Bye [preauth] Jan 12 00:32:58 host sshd[14703]: Disconnected from 118.201.79.222 port 43195 [preauth] Jan 12 00:33:50 host sshd[14808]: User root from 128.199.95.60 not allowed because not listed in AllowUsers Jan 12 00:33:50 host sshd[14808]: input_userauth_request: invalid user root [preauth] Jan 12 00:33:50 host unix_chkpwd[14811]: password check failed for user (root) Jan 12 00:33:50 host sshd[14808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60 user=root Jan 12 00:33:50 host sshd[14808]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:33:52 host sshd[14808]: Failed password for invalid user root from 128.199.95.60 port 47032 ssh2 Jan 12 00:33:52 host sshd[14808]: Received disconnect from 128.199.95.60 port 47032:11: Bye Bye [preauth] Jan 12 00:33:52 host sshd[14808]: Disconnected from 128.199.95.60 port 47032 [preauth] Jan 12 00:34:31 host sshd[14889]: User root from 62.210.28.0 not allowed because not listed in AllowUsers Jan 12 00:34:31 host sshd[14889]: input_userauth_request: invalid user root [preauth] Jan 12 00:34:31 host unix_chkpwd[14892]: password check failed for user (root) Jan 12 00:34:31 host sshd[14889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.28.0 user=root Jan 12 00:34:31 host sshd[14889]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:34:33 host sshd[14889]: Failed password for invalid user root from 62.210.28.0 port 41445 ssh2 Jan 12 00:34:33 host sshd[14889]: Received disconnect from 62.210.28.0 port 41445:11: Bye Bye [preauth] Jan 12 00:34:33 host sshd[14889]: Disconnected from 62.210.28.0 port 41445 [preauth] Jan 12 00:34:42 host sshd[14904]: User root from 27.254.149.199 not allowed because not listed in AllowUsers Jan 12 00:34:42 host sshd[14904]: input_userauth_request: invalid user root [preauth] Jan 12 00:34:42 host unix_chkpwd[14906]: password check failed for user (root) Jan 12 00:34:42 host sshd[14904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.149.199 user=root Jan 12 00:34:42 host sshd[14904]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:34:44 host sshd[14904]: Failed password for invalid user root from 27.254.149.199 port 36936 ssh2 Jan 12 00:34:44 host sshd[14904]: Received disconnect from 27.254.149.199 port 36936:11: Bye Bye [preauth] Jan 12 00:34:44 host sshd[14904]: Disconnected from 27.254.149.199 port 36936 [preauth] Jan 12 00:35:10 host sshd[15008]: User root from 118.34.14.126 not allowed because not listed in AllowUsers Jan 12 00:35:10 host sshd[15008]: input_userauth_request: invalid user root [preauth] Jan 12 00:35:10 host unix_chkpwd[15011]: password check failed for user (root) Jan 12 00:35:10 host sshd[15008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.14.126 user=root Jan 12 00:35:10 host sshd[15008]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:35:12 host sshd[15008]: Failed password for invalid user root from 118.34.14.126 port 46740 ssh2 Jan 12 00:35:12 host sshd[15008]: Received disconnect from 118.34.14.126 port 46740:11: Bye Bye [preauth] Jan 12 00:35:12 host sshd[15008]: Disconnected from 118.34.14.126 port 46740 [preauth] Jan 12 00:35:49 host sshd[15119]: User root from 128.199.95.60 not allowed because not listed in AllowUsers Jan 12 00:35:49 host sshd[15119]: input_userauth_request: invalid user root [preauth] Jan 12 00:35:49 host unix_chkpwd[15122]: password check failed for user (root) Jan 12 00:35:49 host sshd[15119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60 user=root Jan 12 00:35:49 host sshd[15119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:35:51 host sshd[15119]: Failed password for invalid user root from 128.199.95.60 port 46212 ssh2 Jan 12 00:36:14 host sshd[15191]: User root from 62.210.28.0 not allowed because not listed in AllowUsers Jan 12 00:36:14 host sshd[15191]: input_userauth_request: invalid user root [preauth] Jan 12 00:36:14 host unix_chkpwd[15194]: password check failed for user (root) Jan 12 00:36:14 host sshd[15191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.28.0 user=root Jan 12 00:36:14 host sshd[15191]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:36:16 host sshd[15191]: Failed password for invalid user root from 62.210.28.0 port 42886 ssh2 Jan 12 00:38:37 host sshd[15624]: User root from 118.201.79.222 not allowed because not listed in AllowUsers Jan 12 00:38:37 host sshd[15624]: input_userauth_request: invalid user root [preauth] Jan 12 00:38:37 host unix_chkpwd[15626]: password check failed for user (root) Jan 12 00:38:37 host sshd[15624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.201.79.222 user=root Jan 12 00:38:37 host sshd[15624]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 00:38:38 host sshd[15624]: Failed password for invalid user root from 118.201.79.222 port 40697 ssh2 Jan 12 00:38:38 host sshd[15624]: Received disconnect from 118.201.79.222 port 40697:11: Bye Bye [preauth] Jan 12 00:38:38 host sshd[15624]: Disconnected from 118.201.79.222 port 40697 [preauth] Jan 12 00:40:34 host sshd[15876]: Invalid user test from 158.160.41.73 port 48890 Jan 12 00:40:34 host sshd[15876]: input_userauth_request: invalid user test [preauth] Jan 12 00:40:34 host sshd[15876]: pam_unix(sshd:auth): check pass; user unknown Jan 12 00:40:34 host sshd[15876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.41.73 Jan 12 00:40:36 host sshd[15876]: Failed password for invalid user test from 158.160.41.73 port 48890 ssh2 Jan 12 00:40:36 host sshd[15876]: Connection closed by 158.160.41.73 port 48890 [preauth] Jan 12 00:52:29 host sshd[17776]: Invalid user cs from 194.110.203.109 port 40324 Jan 12 00:52:29 host sshd[17776]: input_userauth_request: invalid user cs [preauth] Jan 12 00:52:29 host sshd[17776]: pam_unix(sshd:auth): check pass; user unknown Jan 12 00:52:29 host sshd[17776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 00:52:31 host sshd[17776]: Failed password for invalid user cs from 194.110.203.109 port 40324 ssh2 Jan 12 00:52:34 host sshd[17776]: pam_unix(sshd:auth): check pass; user unknown Jan 12 00:52:37 host sshd[17776]: Failed password for invalid user cs from 194.110.203.109 port 40324 ssh2 Jan 12 00:52:40 host sshd[17776]: pam_unix(sshd:auth): check pass; user unknown Jan 12 00:52:42 host sshd[17776]: Failed password for invalid user cs from 194.110.203.109 port 40324 ssh2 Jan 12 00:52:46 host sshd[17776]: Connection closed by 194.110.203.109 port 40324 [preauth] Jan 12 00:52:46 host sshd[17776]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 01:00:39 host sshd[18938]: Invalid user admin from 82.66.185.198 port 45919 Jan 12 01:00:39 host sshd[18938]: input_userauth_request: invalid user admin [preauth] Jan 12 01:00:39 host sshd[18938]: pam_unix(sshd:auth): check pass; user unknown Jan 12 01:00:39 host sshd[18938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.66.185.198 Jan 12 01:00:41 host sshd[18938]: Failed password for invalid user admin from 82.66.185.198 port 45919 ssh2 Jan 12 01:00:41 host sshd[18938]: Connection closed by 82.66.185.198 port 45919 [preauth] Jan 12 01:08:55 host sshd[19972]: User root from 36.154.10.222 not allowed because not listed in AllowUsers Jan 12 01:08:55 host sshd[19972]: input_userauth_request: invalid user root [preauth] Jan 12 01:08:56 host unix_chkpwd[19979]: password check failed for user (root) Jan 12 01:08:56 host sshd[19972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.154.10.222 user=root Jan 12 01:08:56 host sshd[19972]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 01:08:57 host sshd[19972]: Failed password for invalid user root from 36.154.10.222 port 46732 ssh2 Jan 12 01:08:58 host sshd[19972]: Connection closed by 36.154.10.222 port 46732 [preauth] Jan 12 01:09:01 host sshd[19984]: User root from 36.154.10.222 not allowed because not listed in AllowUsers Jan 12 01:09:01 host sshd[19984]: input_userauth_request: invalid user root [preauth] Jan 12 01:09:01 host unix_chkpwd[19989]: password check failed for user (root) Jan 12 01:09:01 host sshd[19984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.154.10.222 user=root Jan 12 01:09:01 host sshd[19984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 01:09:03 host sshd[19984]: Failed password for invalid user root from 36.154.10.222 port 51548 ssh2 Jan 12 01:09:03 host sshd[19984]: Connection closed by 36.154.10.222 port 51548 [preauth] Jan 12 01:09:07 host sshd[20013]: User root from 36.154.10.222 not allowed because not listed in AllowUsers Jan 12 01:09:07 host sshd[20013]: input_userauth_request: invalid user root [preauth] Jan 12 01:09:07 host unix_chkpwd[20042]: password check failed for user (root) Jan 12 01:09:07 host sshd[20013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.154.10.222 user=root Jan 12 01:09:07 host sshd[20013]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 01:09:09 host sshd[20013]: Failed password for invalid user root from 36.154.10.222 port 55458 ssh2 Jan 12 01:20:38 host sshd[21543]: Invalid user username from 41.215.214.10 port 42126 Jan 12 01:20:38 host sshd[21543]: input_userauth_request: invalid user username [preauth] Jan 12 01:20:38 host sshd[21543]: pam_unix(sshd:auth): check pass; user unknown Jan 12 01:20:38 host sshd[21543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.215.214.10 Jan 12 01:20:40 host sshd[21543]: Failed password for invalid user username from 41.215.214.10 port 42126 ssh2 Jan 12 01:20:40 host sshd[21543]: Connection closed by 41.215.214.10 port 42126 [preauth] Jan 12 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=gifterman user-11=palco123 user-12=phmetals user-13=kottayamcalldriv user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 01:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-o4P5pevRh1klzZWb.~ Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-o4P5pevRh1klzZWb.~' Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-o4P5pevRh1klzZWb.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 01:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 01:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 01:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 01:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 01:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 01:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 01:24:08 host sshd[22126]: Connection closed by 192.241.226.22 port 50314 [preauth] Jan 12 01:29:22 host sshd[22832]: Did not receive identification string from 115.220.223.198 port 55810 Jan 12 01:34:21 host sshd[23489]: Invalid user me from 205.185.113.129 port 60996 Jan 12 01:34:21 host sshd[23489]: input_userauth_request: invalid user me [preauth] Jan 12 01:34:21 host sshd[23489]: pam_unix(sshd:auth): check pass; user unknown Jan 12 01:34:21 host sshd[23489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 12 01:34:23 host sshd[23489]: Failed password for invalid user me from 205.185.113.129 port 60996 ssh2 Jan 12 01:34:23 host sshd[23489]: Connection closed by 205.185.113.129 port 60996 [preauth] Jan 12 01:34:39 host sshd[23539]: User root from 130.61.232.86 not allowed because not listed in AllowUsers Jan 12 01:34:39 host sshd[23539]: input_userauth_request: invalid user root [preauth] Jan 12 01:34:39 host unix_chkpwd[23542]: password check failed for user (root) Jan 12 01:34:39 host sshd[23539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.232.86 user=root Jan 12 01:34:39 host sshd[23539]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 01:34:42 host sshd[23539]: Failed password for invalid user root from 130.61.232.86 port 42808 ssh2 Jan 12 01:34:42 host sshd[23539]: Received disconnect from 130.61.232.86 port 42808:11: Bye Bye [preauth] Jan 12 01:34:42 host sshd[23539]: Disconnected from 130.61.232.86 port 42808 [preauth] Jan 12 01:38:02 host sshd[24042]: User root from 130.61.232.86 not allowed because not listed in AllowUsers Jan 12 01:38:02 host sshd[24042]: input_userauth_request: invalid user root [preauth] Jan 12 01:38:02 host unix_chkpwd[24045]: password check failed for user (root) Jan 12 01:38:02 host sshd[24042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.232.86 user=root Jan 12 01:38:02 host sshd[24042]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 01:38:04 host sshd[24042]: Failed password for invalid user root from 130.61.232.86 port 47042 ssh2 Jan 12 01:38:04 host sshd[24042]: Received disconnect from 130.61.232.86 port 47042:11: Bye Bye [preauth] Jan 12 01:38:04 host sshd[24042]: Disconnected from 130.61.232.86 port 47042 [preauth] Jan 12 01:41:02 host sshd[24560]: User root from 201.63.171.50 not allowed because not listed in AllowUsers Jan 12 01:41:02 host sshd[24560]: input_userauth_request: invalid user root [preauth] Jan 12 01:41:03 host unix_chkpwd[24576]: password check failed for user (root) Jan 12 01:41:03 host sshd[24560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.63.171.50 user=root Jan 12 01:41:03 host sshd[24560]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 01:41:05 host sshd[24560]: Failed password for invalid user root from 201.63.171.50 port 40646 ssh2 Jan 12 01:41:06 host sshd[24560]: Connection closed by 201.63.171.50 port 40646 [preauth] Jan 12 02:01:15 host sshd[27578]: Invalid user ubnt from 78.70.221.91 port 51301 Jan 12 02:01:15 host sshd[27578]: input_userauth_request: invalid user ubnt [preauth] Jan 12 02:01:15 host sshd[27578]: pam_unix(sshd:auth): check pass; user unknown Jan 12 02:01:15 host sshd[27578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.70.221.91 Jan 12 02:01:17 host sshd[27578]: Failed password for invalid user ubnt from 78.70.221.91 port 51301 ssh2 Jan 12 02:01:18 host sshd[27578]: Connection closed by 78.70.221.91 port 51301 [preauth] Jan 12 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=wwwnexidigital user-21=mrsclean user-22=wwwkmaorg user-23=disposeat user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 02:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fzHtVH0bdCVnlJgc.~ Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fzHtVH0bdCVnlJgc.~' Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fzHtVH0bdCVnlJgc.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 02:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 02:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 02:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=wwwkapin user-17=woodpeck user-18=remysagr user-19=disposeat user-20=wwwkmaorg user-21=mrsclean user-22=wwwnexidigital user-23=phmetals user-24=kottayamcalldriv user-25=gifterman user-26=palco123 user-27=straightcurve user-28=wwwletsstalkfood user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 02:29:56 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 12 02:29:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:30:05 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 12 02:30:05 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 12 02:30:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 12 02:30:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 12 02:30:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 12 02:30:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:30:21 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 12 02:30:21 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 12 02:30:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 12 02:30:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 12 02:30:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 12 02:30:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 12 02:30:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 12 02:30:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 12 02:30:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 12 02:30:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 12 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 12 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:30:43 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 12 02:30:43 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 12 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 12 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 02:30:43 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 02:30:43 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:30:44 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 12 02:30:44 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 12 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 12 02:30:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:30:52 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 12 02:30:52 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 12 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 12 02:30:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 12 02:30:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:30:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 12 02:30:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:30:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 12 02:31:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 12 02:31:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:31:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 12 02:31:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 12 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 12 02:31:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 12 02:31:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 12 02:31:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 12 02:31:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:31:30 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 12 02:31:30 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 12 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 12 02:31:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:37 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:31:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 12 02:31:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 12 02:31:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 12 02:31:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 12 02:31:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 12 02:31:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 12 02:31:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:31:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 02:31:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 12 02:31:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:31:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 12 02:32:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:32:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:32:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:32:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 02:32:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 12 02:32:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:32:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 12 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 12 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 12 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:32:32 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 12 02:32:32 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 12 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 12 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 12 02:32:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:32:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:32:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:32:47 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 12 02:32:47 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 12 02:32:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 12 02:32:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:32:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 12 02:32:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:32:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 12 02:32:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:32:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 12 02:33:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 12 02:33:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 12 02:33:15 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 12 02:33:15 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 12 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 12 02:33:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 12 02:33:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 12 02:33:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 12 02:33:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=laundryboniface WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "W3 Total Cache" on Let'"'"'s Stalk Food (http://www.letsstalkfood.com). Installed version: 0.15.1. Available version: 2.2.10.<br/><br/>2. Plugin "W3 Total Cache" on Today'"'"'s Traveller (http://testugo.in/tt). Installed version: 0.14.1. Available version: 2.2.10.<br/><br/>3. Plugin "W3 Total Cache" on Today'"'"'s Traveller (http://testugo.in/tt). Installed version: 0.14.1. Available version: 2.2.10.<br/><br/>4. Plugin "WPForms Lite" on Panlys (https://www.panlys.com). Installed version: 1.6.6. Available version: 1.7.9.1.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed Jan 12 02:33:26 host sudo: wp-toolkit : (command continued) for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): Jan 12 02:33:26 host sudo: wp-toolkit : (command continued) WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we Jan 12 02:33:26 host sudo: wp-toolkit : (command continued) can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>5. Website Jan 12 02:33:26 host sudo: wp-toolkit : (command continued) "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: [error]FailedToExecuteWpCliCommand: chdir /home/woodpeck/public_html/wp: no such file or directory[/error]#012<br/><br/>' --output=json Jan 12 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 12 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 12 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 12 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 12 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 12 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 02:42:03 host sshd[4318]: Invalid user default from 85.65.225.17 port 33205 Jan 12 02:42:03 host sshd[4318]: input_userauth_request: invalid user default [preauth] Jan 12 02:42:03 host sshd[4318]: pam_unix(sshd:auth): check pass; user unknown Jan 12 02:42:03 host sshd[4318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.65.225.17 Jan 12 02:42:05 host sshd[4318]: Failed password for invalid user default from 85.65.225.17 port 33205 ssh2 Jan 12 02:42:05 host sshd[4318]: Connection closed by 85.65.225.17 port 33205 [preauth] Jan 12 02:43:43 host sshd[4620]: Did not receive identification string from 46.101.97.107 port 61000 Jan 12 02:49:58 host sshd[5481]: Invalid user ct from 194.110.203.109 port 44782 Jan 12 02:49:58 host sshd[5481]: input_userauth_request: invalid user ct [preauth] Jan 12 02:49:58 host sshd[5481]: pam_unix(sshd:auth): check pass; user unknown Jan 12 02:49:58 host sshd[5481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 02:50:01 host sshd[5481]: Failed password for invalid user ct from 194.110.203.109 port 44782 ssh2 Jan 12 02:50:04 host sshd[5481]: pam_unix(sshd:auth): check pass; user unknown Jan 12 02:50:06 host sshd[5481]: Failed password for invalid user ct from 194.110.203.109 port 44782 ssh2 Jan 12 02:50:09 host sshd[5481]: pam_unix(sshd:auth): check pass; user unknown Jan 12 02:50:12 host sshd[5481]: Failed password for invalid user ct from 194.110.203.109 port 44782 ssh2 Jan 12 02:50:15 host sshd[5481]: Connection closed by 194.110.203.109 port 44782 [preauth] Jan 12 02:50:15 host sshd[5481]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 02:53:23 host sshd[5848]: Connection closed by 92.246.84.108 port 49968 [preauth] Jan 12 02:55:35 host sshd[6262]: Connection closed by 41.197.31.178 port 45128 [preauth] Jan 12 03:01:52 host sshd[7183]: User root from 110.39.183.18 not allowed because not listed in AllowUsers Jan 12 03:01:52 host sshd[7183]: input_userauth_request: invalid user root [preauth] Jan 12 03:01:53 host unix_chkpwd[7187]: password check failed for user (root) Jan 12 03:01:53 host sshd[7183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.39.183.18 user=root Jan 12 03:01:53 host sshd[7183]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:01:55 host sshd[7183]: Failed password for invalid user root from 110.39.183.18 port 50422 ssh2 Jan 12 03:01:59 host sshd[7183]: Connection closed by 110.39.183.18 port 50422 [preauth] Jan 12 03:05:58 host sshd[7774]: User root from 20.121.113.183 not allowed because not listed in AllowUsers Jan 12 03:05:58 host sshd[7774]: input_userauth_request: invalid user root [preauth] Jan 12 03:05:58 host unix_chkpwd[7778]: password check failed for user (root) Jan 12 03:05:58 host sshd[7774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.121.113.183 user=root Jan 12 03:05:58 host sshd[7774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:06:00 host sshd[7774]: Failed password for invalid user root from 20.121.113.183 port 1216 ssh2 Jan 12 03:06:00 host sshd[7774]: Received disconnect from 20.121.113.183 port 1216:11: Bye Bye [preauth] Jan 12 03:06:00 host sshd[7774]: Disconnected from 20.121.113.183 port 1216 [preauth] Jan 12 03:06:37 host sshd[7853]: User root from 157.230.132.100 not allowed because not listed in AllowUsers Jan 12 03:06:37 host sshd[7853]: input_userauth_request: invalid user root [preauth] Jan 12 03:06:37 host unix_chkpwd[7857]: password check failed for user (root) Jan 12 03:06:37 host sshd[7853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.132.100 user=root Jan 12 03:06:37 host sshd[7853]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:06:39 host sshd[7853]: Failed password for invalid user root from 157.230.132.100 port 41712 ssh2 Jan 12 03:06:39 host sshd[7853]: Received disconnect from 157.230.132.100 port 41712:11: Bye Bye [preauth] Jan 12 03:06:39 host sshd[7853]: Disconnected from 157.230.132.100 port 41712 [preauth] Jan 12 03:08:02 host sshd[7991]: User root from 24.199.104.139 not allowed because not listed in AllowUsers Jan 12 03:08:02 host sshd[7991]: input_userauth_request: invalid user root [preauth] Jan 12 03:08:02 host unix_chkpwd[8005]: password check failed for user (root) Jan 12 03:08:02 host sshd[7991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.139 user=root Jan 12 03:08:02 host sshd[7991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:08:03 host sshd[7991]: Failed password for invalid user root from 24.199.104.139 port 51468 ssh2 Jan 12 03:08:03 host sshd[7991]: Received disconnect from 24.199.104.139 port 51468:11: Bye Bye [preauth] Jan 12 03:08:03 host sshd[7991]: Disconnected from 24.199.104.139 port 51468 [preauth] Jan 12 03:09:29 host sshd[8195]: User root from 84.201.177.10 not allowed because not listed in AllowUsers Jan 12 03:09:29 host sshd[8195]: input_userauth_request: invalid user root [preauth] Jan 12 03:09:29 host unix_chkpwd[8219]: password check failed for user (root) Jan 12 03:09:29 host sshd[8195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.177.10 user=root Jan 12 03:09:29 host sshd[8195]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:09:31 host sshd[8195]: Failed password for invalid user root from 84.201.177.10 port 50854 ssh2 Jan 12 03:09:31 host sshd[8195]: Received disconnect from 84.201.177.10 port 50854:11: Bye Bye [preauth] Jan 12 03:09:31 host sshd[8195]: Disconnected from 84.201.177.10 port 50854 [preauth] Jan 12 03:11:24 host sshd[8537]: User root from 157.230.132.100 not allowed because not listed in AllowUsers Jan 12 03:11:24 host sshd[8537]: input_userauth_request: invalid user root [preauth] Jan 12 03:11:24 host unix_chkpwd[8540]: password check failed for user (root) Jan 12 03:11:24 host sshd[8537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.132.100 user=root Jan 12 03:11:24 host sshd[8537]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:11:25 host sshd[8537]: Failed password for invalid user root from 157.230.132.100 port 36680 ssh2 Jan 12 03:11:51 host sshd[8627]: User root from 24.199.104.139 not allowed because not listed in AllowUsers Jan 12 03:11:51 host sshd[8627]: input_userauth_request: invalid user root [preauth] Jan 12 03:11:51 host unix_chkpwd[8630]: password check failed for user (root) Jan 12 03:11:51 host sshd[8627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.139 user=root Jan 12 03:11:51 host sshd[8627]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:11:53 host sshd[8627]: Failed password for invalid user root from 24.199.104.139 port 57226 ssh2 Jan 12 03:11:53 host sshd[8627]: Received disconnect from 24.199.104.139 port 57226:11: Bye Bye [preauth] Jan 12 03:11:53 host sshd[8627]: Disconnected from 24.199.104.139 port 57226 [preauth] Jan 12 03:11:58 host sshd[8678]: User root from 20.121.113.183 not allowed because not listed in AllowUsers Jan 12 03:11:58 host sshd[8678]: input_userauth_request: invalid user root [preauth] Jan 12 03:11:58 host unix_chkpwd[8681]: password check failed for user (root) Jan 12 03:11:58 host sshd[8678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.121.113.183 user=root Jan 12 03:11:58 host sshd[8678]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:12:00 host sshd[8682]: User root from 84.201.177.10 not allowed because not listed in AllowUsers Jan 12 03:12:00 host sshd[8682]: input_userauth_request: invalid user root [preauth] Jan 12 03:12:00 host unix_chkpwd[8692]: password check failed for user (root) Jan 12 03:12:00 host sshd[8682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.177.10 user=root Jan 12 03:12:00 host sshd[8682]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:12:01 host sshd[8678]: Failed password for invalid user root from 20.121.113.183 port 1216 ssh2 Jan 12 03:12:02 host sshd[8682]: Failed password for invalid user root from 84.201.177.10 port 58350 ssh2 Jan 12 03:12:02 host sshd[8682]: Received disconnect from 84.201.177.10 port 58350:11: Bye Bye [preauth] Jan 12 03:12:02 host sshd[8682]: Disconnected from 84.201.177.10 port 58350 [preauth] Jan 12 03:13:45 host sshd[8969]: Invalid user ernest from 107.189.30.59 port 45248 Jan 12 03:13:45 host sshd[8969]: input_userauth_request: invalid user ernest [preauth] Jan 12 03:13:45 host sshd[8969]: pam_unix(sshd:auth): check pass; user unknown Jan 12 03:13:45 host sshd[8969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 12 03:13:48 host sshd[8969]: Failed password for invalid user ernest from 107.189.30.59 port 45248 ssh2 Jan 12 03:13:48 host sshd[8969]: Connection closed by 107.189.30.59 port 45248 [preauth] Jan 12 03:21:33 host sshd[10194]: Invalid user admin from 64.184.197.145 port 55563 Jan 12 03:21:33 host sshd[10194]: input_userauth_request: invalid user admin [preauth] Jan 12 03:21:33 host sshd[10194]: pam_unix(sshd:auth): check pass; user unknown Jan 12 03:21:33 host sshd[10194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.184.197.145 Jan 12 03:21:35 host sshd[10194]: Failed password for invalid user admin from 64.184.197.145 port 55563 ssh2 Jan 12 03:21:36 host sshd[10194]: Connection closed by 64.184.197.145 port 55563 [preauth] Jan 12 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwresourcehunte user-2=keralaholi user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=cochintaxi user-11=wwwkaretakers user-12=mrsclean user-13=wwwnexidigital user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 03:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ySd7ykFWcYJO4Co3.~ Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ySd7ykFWcYJO4Co3.~' Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ySd7ykFWcYJO4Co3.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 03:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 03:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 03:41:48 host sshd[13540]: User root from 43.240.67.91 not allowed because not listed in AllowUsers Jan 12 03:41:48 host sshd[13540]: input_userauth_request: invalid user root [preauth] Jan 12 03:41:48 host unix_chkpwd[13543]: password check failed for user (root) Jan 12 03:41:48 host sshd[13540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.240.67.91 user=root Jan 12 03:41:48 host sshd[13540]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:41:50 host sshd[13540]: Failed password for invalid user root from 43.240.67.91 port 36898 ssh2 Jan 12 03:41:50 host sshd[13540]: Received disconnect from 43.240.67.91 port 36898:11: Bye Bye [preauth] Jan 12 03:41:50 host sshd[13540]: Disconnected from 43.240.67.91 port 36898 [preauth] Jan 12 03:42:31 host sshd[13633]: Invalid user admin from 94.244.97.69 port 4438 Jan 12 03:42:31 host sshd[13633]: input_userauth_request: invalid user admin [preauth] Jan 12 03:42:31 host sshd[13633]: pam_unix(sshd:auth): check pass; user unknown Jan 12 03:42:31 host sshd[13633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.244.97.69 Jan 12 03:42:33 host sshd[13633]: Failed password for invalid user admin from 94.244.97.69 port 4438 ssh2 Jan 12 03:42:34 host sshd[13633]: Connection closed by 94.244.97.69 port 4438 [preauth] Jan 12 03:45:07 host sshd[14117]: User root from 135.125.236.160 not allowed because not listed in AllowUsers Jan 12 03:45:07 host sshd[14117]: input_userauth_request: invalid user root [preauth] Jan 12 03:45:07 host unix_chkpwd[14120]: password check failed for user (root) Jan 12 03:45:07 host sshd[14117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.236.160 user=root Jan 12 03:45:07 host sshd[14117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:45:10 host sshd[14117]: Failed password for invalid user root from 135.125.236.160 port 51478 ssh2 Jan 12 03:45:10 host sshd[14117]: Received disconnect from 135.125.236.160 port 51478:11: Bye Bye [preauth] Jan 12 03:45:10 host sshd[14117]: Disconnected from 135.125.236.160 port 51478 [preauth] Jan 12 03:45:49 host sshd[14212]: User root from 59.124.170.220 not allowed because not listed in AllowUsers Jan 12 03:45:49 host sshd[14212]: input_userauth_request: invalid user root [preauth] Jan 12 03:45:49 host unix_chkpwd[14217]: password check failed for user (root) Jan 12 03:45:49 host sshd[14212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.170.220 user=root Jan 12 03:45:49 host sshd[14212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:45:51 host sshd[14212]: Failed password for invalid user root from 59.124.170.220 port 60970 ssh2 Jan 12 03:45:51 host sshd[14212]: Received disconnect from 59.124.170.220 port 60970:11: Bye Bye [preauth] Jan 12 03:45:51 host sshd[14212]: Disconnected from 59.124.170.220 port 60970 [preauth] Jan 12 03:46:17 host sshd[14261]: User root from 68.183.156.109 not allowed because not listed in AllowUsers Jan 12 03:46:17 host sshd[14261]: input_userauth_request: invalid user root [preauth] Jan 12 03:46:17 host unix_chkpwd[14264]: password check failed for user (root) Jan 12 03:46:17 host sshd[14261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.156.109 user=root Jan 12 03:46:17 host sshd[14261]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:46:19 host sshd[14261]: Failed password for invalid user root from 68.183.156.109 port 49890 ssh2 Jan 12 03:46:19 host sshd[14261]: Received disconnect from 68.183.156.109 port 49890:11: Bye Bye [preauth] Jan 12 03:46:19 host sshd[14261]: Disconnected from 68.183.156.109 port 49890 [preauth] Jan 12 03:46:28 host sshd[14283]: User root from 13.93.75.74 not allowed because not listed in AllowUsers Jan 12 03:46:28 host sshd[14283]: input_userauth_request: invalid user root [preauth] Jan 12 03:46:28 host unix_chkpwd[14286]: password check failed for user (root) Jan 12 03:46:28 host sshd[14283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.93.75.74 user=root Jan 12 03:46:28 host sshd[14283]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:46:29 host sshd[14283]: Failed password for invalid user root from 13.93.75.74 port 1024 ssh2 Jan 12 03:46:29 host sshd[14283]: Received disconnect from 13.93.75.74 port 1024:11: Bye Bye [preauth] Jan 12 03:46:29 host sshd[14283]: Disconnected from 13.93.75.74 port 1024 [preauth] Jan 12 03:47:02 host sshd[14371]: User root from 167.99.242.118 not allowed because not listed in AllowUsers Jan 12 03:47:02 host sshd[14371]: input_userauth_request: invalid user root [preauth] Jan 12 03:47:02 host unix_chkpwd[14416]: password check failed for user (root) Jan 12 03:47:02 host sshd[14371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.242.118 user=root Jan 12 03:47:02 host sshd[14371]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:47:04 host sshd[14371]: Failed password for invalid user root from 167.99.242.118 port 45924 ssh2 Jan 12 03:47:04 host sshd[14371]: Received disconnect from 167.99.242.118 port 45924:11: Bye Bye [preauth] Jan 12 03:47:04 host sshd[14371]: Disconnected from 167.99.242.118 port 45924 [preauth] Jan 12 03:47:41 host sshd[14553]: User root from 43.240.67.91 not allowed because not listed in AllowUsers Jan 12 03:47:41 host sshd[14553]: input_userauth_request: invalid user root [preauth] Jan 12 03:47:41 host unix_chkpwd[14556]: password check failed for user (root) Jan 12 03:47:41 host sshd[14553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.240.67.91 user=root Jan 12 03:47:41 host sshd[14553]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:47:43 host sshd[14553]: Failed password for invalid user root from 43.240.67.91 port 39370 ssh2 Jan 12 03:47:43 host sshd[14553]: Received disconnect from 43.240.67.91 port 39370:11: Bye Bye [preauth] Jan 12 03:47:43 host sshd[14553]: Disconnected from 43.240.67.91 port 39370 [preauth] Jan 12 03:48:10 host sshd[14645]: User root from 68.183.156.109 not allowed because not listed in AllowUsers Jan 12 03:48:10 host sshd[14645]: input_userauth_request: invalid user root [preauth] Jan 12 03:48:10 host unix_chkpwd[14648]: password check failed for user (root) Jan 12 03:48:10 host sshd[14645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.156.109 user=root Jan 12 03:48:10 host sshd[14645]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:48:12 host sshd[14645]: Failed password for invalid user root from 68.183.156.109 port 54652 ssh2 Jan 12 03:48:36 host sshd[14733]: User root from 13.93.75.74 not allowed because not listed in AllowUsers Jan 12 03:48:36 host sshd[14733]: input_userauth_request: invalid user root [preauth] Jan 12 03:48:36 host unix_chkpwd[14736]: password check failed for user (root) Jan 12 03:48:36 host sshd[14733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.93.75.74 user=root Jan 12 03:48:36 host sshd[14733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:48:37 host sshd[14733]: Failed password for invalid user root from 13.93.75.74 port 1024 ssh2 Jan 12 03:48:53 host sshd[14786]: User root from 167.99.242.118 not allowed because not listed in AllowUsers Jan 12 03:48:53 host sshd[14786]: input_userauth_request: invalid user root [preauth] Jan 12 03:48:53 host unix_chkpwd[14789]: password check failed for user (root) Jan 12 03:48:53 host sshd[14786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.242.118 user=root Jan 12 03:48:53 host sshd[14786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:48:54 host sshd[14786]: Failed password for invalid user root from 167.99.242.118 port 47138 ssh2 Jan 12 03:48:55 host sshd[14786]: Received disconnect from 167.99.242.118 port 47138:11: Bye Bye [preauth] Jan 12 03:48:55 host sshd[14786]: Disconnected from 167.99.242.118 port 47138 [preauth] Jan 12 03:50:06 host sshd[14979]: User root from 59.124.170.220 not allowed because not listed in AllowUsers Jan 12 03:50:06 host sshd[14979]: input_userauth_request: invalid user root [preauth] Jan 12 03:50:06 host unix_chkpwd[14981]: password check failed for user (root) Jan 12 03:50:06 host sshd[14979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.170.220 user=root Jan 12 03:50:06 host sshd[14979]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:50:07 host sshd[14979]: Failed password for invalid user root from 59.124.170.220 port 44444 ssh2 Jan 12 03:51:35 host sshd[15207]: User root from 135.125.236.160 not allowed because not listed in AllowUsers Jan 12 03:51:35 host sshd[15207]: input_userauth_request: invalid user root [preauth] Jan 12 03:51:35 host unix_chkpwd[15210]: password check failed for user (root) Jan 12 03:51:35 host sshd[15207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.236.160 user=root Jan 12 03:51:35 host sshd[15207]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 03:51:38 host sshd[15207]: Failed password for invalid user root from 135.125.236.160 port 42164 ssh2 Jan 12 04:02:10 host sshd[17149]: Invalid user engineer from 184.80.221.250 port 49497 Jan 12 04:02:10 host sshd[17149]: input_userauth_request: invalid user engineer [preauth] Jan 12 04:02:11 host sshd[17149]: pam_unix(sshd:auth): check pass; user unknown Jan 12 04:02:11 host sshd[17149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.80.221.250 Jan 12 04:02:13 host sshd[17149]: Failed password for invalid user engineer from 184.80.221.250 port 49497 ssh2 Jan 12 04:02:13 host sshd[17149]: Connection closed by 184.80.221.250 port 49497 [preauth] Jan 12 04:05:12 host sshd[17751]: Did not receive identification string from 85.31.46.253 port 45520 Jan 12 04:06:36 host sshd[17916]: Did not receive identification string from 85.31.46.253 port 44292 Jan 12 04:07:56 host sshd[18091]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 12 04:07:56 host sshd[18091]: input_userauth_request: invalid user root [preauth] Jan 12 04:07:56 host unix_chkpwd[18095]: password check failed for user (root) Jan 12 04:07:56 host sshd[18091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 12 04:07:56 host sshd[18091]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 04:07:58 host sshd[18091]: Failed password for invalid user root from 195.226.194.242 port 46148 ssh2 Jan 12 04:07:58 host sshd[18091]: Received disconnect from 195.226.194.242 port 46148:11: Bye Bye [preauth] Jan 12 04:07:58 host sshd[18091]: Disconnected from 195.226.194.242 port 46148 [preauth] Jan 12 04:08:00 host sshd[18105]: Did not receive identification string from 85.31.46.253 port 43454 Jan 12 04:09:24 host sshd[18501]: Did not receive identification string from 85.31.46.253 port 41392 Jan 12 04:13:14 host sshd[19364]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 12 04:13:14 host sshd[19364]: input_userauth_request: invalid user root [preauth] Jan 12 04:13:14 host unix_chkpwd[19385]: password check failed for user (root) Jan 12 04:13:14 host sshd[19364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 12 04:13:14 host sshd[19364]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 04:13:15 host sshd[19364]: Failed password for invalid user root from 194.169.175.102 port 62676 ssh2 Jan 12 04:13:17 host sshd[19364]: Received disconnect from 194.169.175.102 port 62676:11: Client disconnecting normally [preauth] Jan 12 04:13:17 host sshd[19364]: Disconnected from 194.169.175.102 port 62676 [preauth] Jan 12 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=wwwresourcehunte user-7=keralaholi user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=palco123 user-24=gifterman user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 04:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Z6midpm7DH0EcOSd.~ Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Z6midpm7DH0EcOSd.~' Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Z6midpm7DH0EcOSd.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 04:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 04:38:02 host sshd[24298]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 12 04:38:02 host sshd[24298]: input_userauth_request: invalid user root [preauth] Jan 12 04:38:02 host unix_chkpwd[24300]: password check failed for user (root) Jan 12 04:38:02 host sshd[24298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 12 04:38:02 host sshd[24298]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 04:38:05 host sshd[24298]: Failed password for invalid user root from 195.226.194.242 port 32916 ssh2 Jan 12 04:42:59 host sshd[25108]: Invalid user admin from 41.74.139.156 port 47072 Jan 12 04:42:59 host sshd[25108]: input_userauth_request: invalid user admin [preauth] Jan 12 04:43:00 host sshd[25108]: pam_unix(sshd:auth): check pass; user unknown Jan 12 04:43:00 host sshd[25108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.74.139.156 Jan 12 04:43:02 host sshd[25108]: Failed password for invalid user admin from 41.74.139.156 port 47072 ssh2 Jan 12 04:43:02 host sshd[25108]: Connection closed by 41.74.139.156 port 47072 [preauth] Jan 12 04:48:00 host sshd[25881]: Invalid user cu from 194.110.203.109 port 36410 Jan 12 04:48:00 host sshd[25881]: input_userauth_request: invalid user cu [preauth] Jan 12 04:48:00 host sshd[25881]: pam_unix(sshd:auth): check pass; user unknown Jan 12 04:48:00 host sshd[25881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 04:48:03 host sshd[25881]: Failed password for invalid user cu from 194.110.203.109 port 36410 ssh2 Jan 12 04:48:06 host sshd[25881]: pam_unix(sshd:auth): check pass; user unknown Jan 12 04:48:08 host sshd[25881]: Failed password for invalid user cu from 194.110.203.109 port 36410 ssh2 Jan 12 04:48:11 host sshd[25881]: pam_unix(sshd:auth): check pass; user unknown Jan 12 04:48:13 host sshd[25881]: Failed password for invalid user cu from 194.110.203.109 port 36410 ssh2 Jan 12 04:48:16 host sshd[25881]: Connection closed by 194.110.203.109 port 36410 [preauth] Jan 12 04:48:16 host sshd[25881]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 04:54:26 host sshd[26774]: User root from 128.199.177.90 not allowed because not listed in AllowUsers Jan 12 04:54:26 host sshd[26774]: input_userauth_request: invalid user root [preauth] Jan 12 04:54:27 host unix_chkpwd[26777]: password check failed for user (root) Jan 12 04:54:27 host sshd[26774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.177.90 user=root Jan 12 04:54:27 host sshd[26774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 04:54:29 host sshd[26774]: Failed password for invalid user root from 128.199.177.90 port 34102 ssh2 Jan 12 04:54:29 host sshd[26774]: Received disconnect from 128.199.177.90 port 34102:11: Bye Bye [preauth] Jan 12 04:54:29 host sshd[26774]: Disconnected from 128.199.177.90 port 34102 [preauth] Jan 12 04:55:14 host sshd[26903]: User root from 218.253.66.74 not allowed because not listed in AllowUsers Jan 12 04:55:14 host sshd[26903]: input_userauth_request: invalid user root [preauth] Jan 12 04:55:14 host unix_chkpwd[26907]: password check failed for user (root) Jan 12 04:55:14 host sshd[26903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.66.74 user=root Jan 12 04:55:14 host sshd[26903]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 04:55:16 host sshd[26903]: Failed password for invalid user root from 218.253.66.74 port 45842 ssh2 Jan 12 04:55:16 host sshd[26903]: Received disconnect from 218.253.66.74 port 45842:11: Bye Bye [preauth] Jan 12 04:55:16 host sshd[26903]: Disconnected from 218.253.66.74 port 45842 [preauth] Jan 12 04:55:25 host sshd[26928]: User root from 43.163.223.33 not allowed because not listed in AllowUsers Jan 12 04:55:25 host sshd[26928]: input_userauth_request: invalid user root [preauth] Jan 12 04:55:25 host unix_chkpwd[26931]: password check failed for user (root) Jan 12 04:55:25 host sshd[26928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.223.33 user=root Jan 12 04:55:25 host sshd[26928]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 04:55:27 host sshd[26928]: Failed password for invalid user root from 43.163.223.33 port 39932 ssh2 Jan 12 04:55:27 host sshd[26928]: Received disconnect from 43.163.223.33 port 39932:11: Bye Bye [preauth] Jan 12 04:55:27 host sshd[26928]: Disconnected from 43.163.223.33 port 39932 [preauth] Jan 12 04:57:26 host sshd[27305]: User root from 137.184.35.63 not allowed because not listed in AllowUsers Jan 12 04:57:26 host sshd[27305]: input_userauth_request: invalid user root [preauth] Jan 12 04:57:26 host unix_chkpwd[27308]: password check failed for user (root) Jan 12 04:57:26 host sshd[27305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.35.63 user=root Jan 12 04:57:26 host sshd[27305]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 04:57:27 host sshd[27305]: Failed password for invalid user root from 137.184.35.63 port 35312 ssh2 Jan 12 04:57:28 host sshd[27305]: Received disconnect from 137.184.35.63 port 35312:11: Bye Bye [preauth] Jan 12 04:57:28 host sshd[27305]: Disconnected from 137.184.35.63 port 35312 [preauth] Jan 12 04:57:29 host sshd[27312]: User root from 103.179.74.2 not allowed because not listed in AllowUsers Jan 12 04:57:29 host sshd[27312]: input_userauth_request: invalid user root [preauth] Jan 12 04:57:29 host unix_chkpwd[27336]: password check failed for user (root) Jan 12 04:57:29 host sshd[27312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.74.2 user=root Jan 12 04:57:29 host sshd[27312]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 04:57:31 host sshd[27312]: Failed password for invalid user root from 103.179.74.2 port 55702 ssh2 Jan 12 04:57:31 host sshd[27312]: Received disconnect from 103.179.74.2 port 55702:11: Bye Bye [preauth] Jan 12 04:57:31 host sshd[27312]: Disconnected from 103.179.74.2 port 55702 [preauth] Jan 12 05:00:43 host sshd[27776]: User root from 43.163.223.33 not allowed because not listed in AllowUsers Jan 12 05:00:43 host sshd[27776]: input_userauth_request: invalid user root [preauth] Jan 12 05:00:43 host unix_chkpwd[27778]: password check failed for user (root) Jan 12 05:00:43 host sshd[27776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.223.33 user=root Jan 12 05:00:43 host sshd[27776]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:00:46 host sshd[27776]: Failed password for invalid user root from 43.163.223.33 port 38222 ssh2 Jan 12 05:01:01 host sshd[27836]: User root from 128.199.177.90 not allowed because not listed in AllowUsers Jan 12 05:01:01 host sshd[27836]: input_userauth_request: invalid user root [preauth] Jan 12 05:01:01 host unix_chkpwd[27838]: password check failed for user (root) Jan 12 05:01:01 host sshd[27836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.177.90 user=root Jan 12 05:01:01 host sshd[27836]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:01:03 host sshd[27836]: Failed password for invalid user root from 128.199.177.90 port 39814 ssh2 Jan 12 05:01:03 host sshd[27836]: Received disconnect from 128.199.177.90 port 39814:11: Bye Bye [preauth] Jan 12 05:01:03 host sshd[27836]: Disconnected from 128.199.177.90 port 39814 [preauth] Jan 12 05:01:17 host sshd[28039]: User root from 103.179.74.2 not allowed because not listed in AllowUsers Jan 12 05:01:17 host sshd[28039]: input_userauth_request: invalid user root [preauth] Jan 12 05:01:17 host unix_chkpwd[28042]: password check failed for user (root) Jan 12 05:01:17 host sshd[28039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.74.2 user=root Jan 12 05:01:17 host sshd[28039]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:01:19 host sshd[28039]: Failed password for invalid user root from 103.179.74.2 port 43090 ssh2 Jan 12 05:01:35 host sshd[28119]: User root from 34.101.240.144 not allowed because not listed in AllowUsers Jan 12 05:01:35 host sshd[28119]: input_userauth_request: invalid user root [preauth] Jan 12 05:01:35 host unix_chkpwd[28122]: password check failed for user (root) Jan 12 05:01:35 host sshd[28119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.101.240.144 user=root Jan 12 05:01:35 host sshd[28119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:01:37 host sshd[28125]: User root from 137.184.35.63 not allowed because not listed in AllowUsers Jan 12 05:01:37 host sshd[28125]: input_userauth_request: invalid user root [preauth] Jan 12 05:01:37 host unix_chkpwd[28129]: password check failed for user (root) Jan 12 05:01:37 host sshd[28125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.35.63 user=root Jan 12 05:01:37 host sshd[28125]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:01:38 host sshd[28119]: Failed password for invalid user root from 34.101.240.144 port 43304 ssh2 Jan 12 05:01:38 host sshd[28119]: Received disconnect from 34.101.240.144 port 43304:11: Bye Bye [preauth] Jan 12 05:01:38 host sshd[28119]: Disconnected from 34.101.240.144 port 43304 [preauth] Jan 12 05:01:39 host sshd[28125]: Failed password for invalid user root from 137.184.35.63 port 45196 ssh2 Jan 12 05:02:30 host sshd[28256]: User root from 189.56.220.63 not allowed because not listed in AllowUsers Jan 12 05:02:30 host sshd[28256]: input_userauth_request: invalid user root [preauth] Jan 12 05:02:31 host unix_chkpwd[28282]: password check failed for user (root) Jan 12 05:02:31 host sshd[28256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.56.220.63 user=root Jan 12 05:02:31 host sshd[28256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:02:33 host sshd[28256]: Failed password for invalid user root from 189.56.220.63 port 55199 ssh2 Jan 12 05:02:33 host sshd[28256]: Connection closed by 189.56.220.63 port 55199 [preauth] Jan 12 05:02:38 host sshd[28293]: User root from 76.176.104.32 not allowed because not listed in AllowUsers Jan 12 05:02:38 host sshd[28293]: input_userauth_request: invalid user root [preauth] Jan 12 05:02:38 host unix_chkpwd[28297]: password check failed for user (root) Jan 12 05:02:38 host sshd[28293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.176.104.32 user=root Jan 12 05:02:38 host sshd[28293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:02:39 host sshd[28293]: Failed password for invalid user root from 76.176.104.32 port 46916 ssh2 Jan 12 05:02:40 host sshd[28293]: Received disconnect from 76.176.104.32 port 46916:11: Bye Bye [preauth] Jan 12 05:02:40 host sshd[28293]: Disconnected from 76.176.104.32 port 46916 [preauth] Jan 12 05:03:37 host sshd[28424]: User root from 218.253.66.74 not allowed because not listed in AllowUsers Jan 12 05:03:37 host sshd[28424]: input_userauth_request: invalid user root [preauth] Jan 12 05:03:37 host unix_chkpwd[28426]: password check failed for user (root) Jan 12 05:03:37 host sshd[28424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.66.74 user=root Jan 12 05:03:37 host sshd[28424]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:03:39 host sshd[28424]: Failed password for invalid user root from 218.253.66.74 port 43510 ssh2 Jan 12 05:03:39 host sshd[28424]: Received disconnect from 218.253.66.74 port 43510:11: Bye Bye [preauth] Jan 12 05:03:39 host sshd[28424]: Disconnected from 218.253.66.74 port 43510 [preauth] Jan 12 05:04:32 host sshd[28569]: User root from 76.176.104.32 not allowed because not listed in AllowUsers Jan 12 05:04:32 host sshd[28569]: input_userauth_request: invalid user root [preauth] Jan 12 05:04:32 host unix_chkpwd[28573]: password check failed for user (root) Jan 12 05:04:32 host sshd[28569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.176.104.32 user=root Jan 12 05:04:32 host sshd[28569]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:04:34 host sshd[28569]: Failed password for invalid user root from 76.176.104.32 port 48315 ssh2 Jan 12 05:04:34 host sshd[28569]: Received disconnect from 76.176.104.32 port 48315:11: Bye Bye [preauth] Jan 12 05:04:34 host sshd[28569]: Disconnected from 76.176.104.32 port 48315 [preauth] Jan 12 05:06:05 host sshd[28787]: User root from 34.101.240.144 not allowed because not listed in AllowUsers Jan 12 05:06:05 host sshd[28787]: input_userauth_request: invalid user root [preauth] Jan 12 05:06:05 host unix_chkpwd[28793]: password check failed for user (root) Jan 12 05:06:05 host sshd[28787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.101.240.144 user=root Jan 12 05:06:05 host sshd[28787]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:06:07 host sshd[28787]: Failed password for invalid user root from 34.101.240.144 port 47750 ssh2 Jan 12 05:06:07 host sshd[28787]: Received disconnect from 34.101.240.144 port 47750:11: Bye Bye [preauth] Jan 12 05:06:07 host sshd[28787]: Disconnected from 34.101.240.144 port 47750 [preauth] Jan 12 05:15:55 host sshd[30253]: User root from 122.155.166.78 not allowed because not listed in AllowUsers Jan 12 05:15:55 host sshd[30253]: input_userauth_request: invalid user root [preauth] Jan 12 05:15:55 host unix_chkpwd[30256]: password check failed for user (root) Jan 12 05:15:55 host sshd[30253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.166.78 user=root Jan 12 05:15:55 host sshd[30253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:15:56 host sshd[30253]: Failed password for invalid user root from 122.155.166.78 port 53530 ssh2 Jan 12 05:15:56 host sshd[30253]: Received disconnect from 122.155.166.78 port 53530:11: Bye Bye [preauth] Jan 12 05:15:56 host sshd[30253]: Disconnected from 122.155.166.78 port 53530 [preauth] Jan 12 05:17:58 host sshd[30630]: User root from 143.198.154.97 not allowed because not listed in AllowUsers Jan 12 05:17:58 host sshd[30630]: input_userauth_request: invalid user root [preauth] Jan 12 05:17:58 host unix_chkpwd[30634]: password check failed for user (root) Jan 12 05:17:58 host sshd[30630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.154.97 user=root Jan 12 05:17:58 host sshd[30630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:18:00 host sshd[30630]: Failed password for invalid user root from 143.198.154.97 port 45716 ssh2 Jan 12 05:18:00 host sshd[30630]: Received disconnect from 143.198.154.97 port 45716:11: Bye Bye [preauth] Jan 12 05:18:00 host sshd[30630]: Disconnected from 143.198.154.97 port 45716 [preauth] Jan 12 05:18:01 host sshd[30636]: User root from 132.255.169.30 not allowed because not listed in AllowUsers Jan 12 05:18:01 host sshd[30636]: input_userauth_request: invalid user root [preauth] Jan 12 05:18:01 host unix_chkpwd[30648]: password check failed for user (root) Jan 12 05:18:01 host sshd[30636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.169.30 user=root Jan 12 05:18:01 host sshd[30636]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:18:03 host sshd[30636]: Failed password for invalid user root from 132.255.169.30 port 47586 ssh2 Jan 12 05:18:03 host sshd[30636]: Received disconnect from 132.255.169.30 port 47586:11: Bye Bye [preauth] Jan 12 05:18:03 host sshd[30636]: Disconnected from 132.255.169.30 port 47586 [preauth] Jan 12 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 05:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 12 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 12 05:21:59 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 12 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 05:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 12 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 12 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 12 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 12 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 12 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 12 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 12 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-4x4VeYopeeopFLQY.wp-toolkit-identifier Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 12 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-4x4VeYopeeopFLQY.wp-toolkit-identifier Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 12 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 12 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 12 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-oHyeyrMChq2EEhkK.wp-toolkit-identifier Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 12 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-oHyeyrMChq2EEhkK.wp-toolkit-identifier Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 12 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RAgrgzP89GRYFLdW.~ Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RAgrgzP89GRYFLdW.~' Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RAgrgzP89GRYFLdW.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 05:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 05:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 05:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:22:10 host sshd[31793]: User root from 122.155.166.78 not allowed because not listed in AllowUsers Jan 12 05:22:10 host sshd[31793]: input_userauth_request: invalid user root [preauth] Jan 12 05:22:10 host unix_chkpwd[31805]: password check failed for user (root) Jan 12 05:22:10 host sshd[31793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.166.78 user=root Jan 12 05:22:10 host sshd[31793]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:22:11 host sshd[31793]: Failed password for invalid user root from 122.155.166.78 port 57336 ssh2 Jan 12 05:22:11 host sshd[31793]: Received disconnect from 122.155.166.78 port 57336:11: Bye Bye [preauth] Jan 12 05:22:11 host sshd[31793]: Disconnected from 122.155.166.78 port 57336 [preauth] Jan 12 05:22:13 host sshd[31809]: User root from 132.255.169.30 not allowed because not listed in AllowUsers Jan 12 05:22:13 host sshd[31809]: input_userauth_request: invalid user root [preauth] Jan 12 05:22:13 host unix_chkpwd[31825]: password check failed for user (root) Jan 12 05:22:13 host sshd[31809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.255.169.30 user=root Jan 12 05:22:13 host sshd[31809]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:22:14 host sshd[31809]: Failed password for invalid user root from 132.255.169.30 port 47590 ssh2 Jan 12 05:22:14 host sshd[31809]: Received disconnect from 132.255.169.30 port 47590:11: Bye Bye [preauth] Jan 12 05:22:14 host sshd[31809]: Disconnected from 132.255.169.30 port 47590 [preauth] Jan 12 05:22:19 host sshd[31933]: User root from 143.198.154.97 not allowed because not listed in AllowUsers Jan 12 05:22:19 host sshd[31933]: input_userauth_request: invalid user root [preauth] Jan 12 05:22:19 host unix_chkpwd[31937]: password check failed for user (root) Jan 12 05:22:19 host sshd[31933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.154.97 user=root Jan 12 05:22:19 host sshd[31933]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 05:22:21 host sshd[31933]: Failed password for invalid user root from 143.198.154.97 port 33332 ssh2 Jan 12 05:23:17 host sshd[32112]: Invalid user ftpuser from 38.44.67.232 port 57931 Jan 12 05:23:17 host sshd[32112]: input_userauth_request: invalid user ftpuser [preauth] Jan 12 05:23:17 host sshd[32112]: pam_unix(sshd:auth): check pass; user unknown Jan 12 05:23:17 host sshd[32112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.44.67.232 Jan 12 05:23:19 host sshd[32112]: Failed password for invalid user ftpuser from 38.44.67.232 port 57931 ssh2 Jan 12 05:23:19 host sshd[32112]: Connection closed by 38.44.67.232 port 57931 [preauth] Jan 12 05:26:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:26:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:26:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:26:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:26:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:26:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:26:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 05:26:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 05:42:40 host sshd[2476]: Invalid user uucp from 36.91.88.157 port 50007 Jan 12 05:42:40 host sshd[2476]: input_userauth_request: invalid user uucp [preauth] Jan 12 05:42:41 host sshd[2476]: pam_unix(sshd:auth): check pass; user unknown Jan 12 05:42:41 host sshd[2476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.88.157 Jan 12 05:42:44 host sshd[2476]: Failed password for invalid user uucp from 36.91.88.157 port 50007 ssh2 Jan 12 05:42:47 host sshd[2476]: Connection closed by 36.91.88.157 port 50007 [preauth] Jan 12 05:48:30 host sshd[3366]: Invalid user landscape from 205.185.113.129 port 47456 Jan 12 05:48:30 host sshd[3366]: input_userauth_request: invalid user landscape [preauth] Jan 12 05:48:30 host sshd[3366]: pam_unix(sshd:auth): check pass; user unknown Jan 12 05:48:30 host sshd[3366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 12 05:48:31 host sshd[3366]: Failed password for invalid user landscape from 205.185.113.129 port 47456 ssh2 Jan 12 05:48:32 host sshd[3366]: Connection closed by 205.185.113.129 port 47456 [preauth] Jan 12 05:48:43 host sshd[3404]: Invalid user oracle from 159.89.52.177 port 55200 Jan 12 05:48:43 host sshd[3404]: input_userauth_request: invalid user oracle [preauth] Jan 12 05:48:44 host sshd[3404]: pam_unix(sshd:auth): check pass; user unknown Jan 12 05:48:44 host sshd[3404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.52.177 Jan 12 05:48:46 host sshd[3404]: Failed password for invalid user oracle from 159.89.52.177 port 55200 ssh2 Jan 12 05:48:46 host sshd[3404]: Received disconnect from 159.89.52.177 port 55200:11: Bye Bye [preauth] Jan 12 05:48:46 host sshd[3404]: Disconnected from 159.89.52.177 port 55200 [preauth] Jan 12 06:02:43 host sshd[5364]: Invalid user vpn from 200.205.245.243 port 35133 Jan 12 06:02:43 host sshd[5364]: input_userauth_request: invalid user vpn [preauth] Jan 12 06:02:44 host sshd[5364]: pam_unix(sshd:auth): check pass; user unknown Jan 12 06:02:44 host sshd[5364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.205.245.243 Jan 12 06:02:46 host sshd[5364]: Failed password for invalid user vpn from 200.205.245.243 port 35133 ssh2 Jan 12 06:02:46 host sshd[5364]: Connection closed by 200.205.245.243 port 35133 [preauth] Jan 12 06:15:55 host sshd[7530]: Connection closed by 172.105.128.13 port 29058 [preauth] Jan 12 06:15:56 host sshd[7535]: Did not receive identification string from 172.105.128.13 port 29064 Jan 12 06:15:57 host sshd[7537]: Connection closed by 172.105.128.13 port 29068 [preauth] Jan 12 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 06:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 06:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9CmsWklNHHsMeUmO.~ Jan 12 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9CmsWklNHHsMeUmO.~' Jan 12 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9CmsWklNHHsMeUmO.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 06:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 06:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 06:22:25 host sshd[8738]: Invalid user admin from 203.135.23.117 port 55580 Jan 12 06:22:25 host sshd[8738]: input_userauth_request: invalid user admin [preauth] Jan 12 06:22:25 host sshd[8738]: pam_unix(sshd:auth): check pass; user unknown Jan 12 06:22:25 host sshd[8738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.135.23.117 Jan 12 06:22:28 host sshd[8738]: Failed password for invalid user admin from 203.135.23.117 port 55580 ssh2 Jan 12 06:22:28 host sshd[8738]: Connection closed by 203.135.23.117 port 55580 [preauth] Jan 12 06:22:35 host sshd[8787]: User root from 51.250.69.85 not allowed because not listed in AllowUsers Jan 12 06:22:35 host sshd[8787]: input_userauth_request: invalid user root [preauth] Jan 12 06:22:35 host unix_chkpwd[8791]: password check failed for user (root) Jan 12 06:22:35 host sshd[8787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.69.85 user=root Jan 12 06:22:35 host sshd[8787]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 06:22:37 host sshd[8787]: Failed password for invalid user root from 51.250.69.85 port 42218 ssh2 Jan 12 06:22:37 host sshd[8787]: Received disconnect from 51.250.69.85 port 42218:11: Bye Bye [preauth] Jan 12 06:22:37 host sshd[8787]: Disconnected from 51.250.69.85 port 42218 [preauth] Jan 12 06:22:40 host sshd[8799]: User root from 212.145.210.150 not allowed because not listed in AllowUsers Jan 12 06:22:40 host sshd[8799]: input_userauth_request: invalid user root [preauth] Jan 12 06:22:40 host unix_chkpwd[8801]: password check failed for user (root) Jan 12 06:22:40 host sshd[8799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.210.150 user=root Jan 12 06:22:40 host sshd[8799]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 06:22:42 host sshd[8799]: Failed password for invalid user root from 212.145.210.150 port 36364 ssh2 Jan 12 06:22:42 host sshd[8799]: Received disconnect from 212.145.210.150 port 36364:11: Bye Bye [preauth] Jan 12 06:22:42 host sshd[8799]: Disconnected from 212.145.210.150 port 36364 [preauth] Jan 12 06:24:01 host sshd[8959]: User root from 175.138.187.14 not allowed because not listed in AllowUsers Jan 12 06:24:01 host sshd[8959]: input_userauth_request: invalid user root [preauth] Jan 12 06:24:01 host unix_chkpwd[8971]: password check failed for user (root) Jan 12 06:24:01 host sshd[8959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.187.14 user=root Jan 12 06:24:01 host sshd[8959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 06:24:03 host sshd[8959]: Failed password for invalid user root from 175.138.187.14 port 34128 ssh2 Jan 12 06:24:03 host sshd[8959]: Received disconnect from 175.138.187.14 port 34128:11: Bye Bye [preauth] Jan 12 06:24:03 host sshd[8959]: Disconnected from 175.138.187.14 port 34128 [preauth] Jan 12 06:24:03 host sshd[8973]: User root from 202.165.15.167 not allowed because not listed in AllowUsers Jan 12 06:24:03 host sshd[8973]: input_userauth_request: invalid user root [preauth] Jan 12 06:24:03 host unix_chkpwd[8976]: password check failed for user (root) Jan 12 06:24:03 host sshd[8973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.165.15.167 user=root Jan 12 06:24:03 host sshd[8973]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 06:24:05 host sshd[8973]: Failed password for invalid user root from 202.165.15.167 port 46846 ssh2 Jan 12 06:24:05 host sshd[8973]: Received disconnect from 202.165.15.167 port 46846:11: Bye Bye [preauth] Jan 12 06:24:05 host sshd[8973]: Disconnected from 202.165.15.167 port 46846 [preauth] Jan 12 06:27:48 host sshd[9549]: User root from 156.236.70.126 not allowed because not listed in AllowUsers Jan 12 06:27:48 host sshd[9549]: input_userauth_request: invalid user root [preauth] Jan 12 06:27:49 host unix_chkpwd[9552]: password check failed for user (root) Jan 12 06:27:49 host sshd[9549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.70.126 user=root Jan 12 06:27:49 host sshd[9549]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 06:27:50 host sshd[9549]: Failed password for invalid user root from 156.236.70.126 port 38900 ssh2 Jan 12 06:27:50 host sshd[9549]: Received disconnect from 156.236.70.126 port 38900:11: Bye Bye [preauth] Jan 12 06:27:50 host sshd[9549]: Disconnected from 156.236.70.126 port 38900 [preauth] Jan 12 06:28:08 host sshd[9596]: User root from 51.250.69.85 not allowed because not listed in AllowUsers Jan 12 06:28:08 host sshd[9596]: input_userauth_request: invalid user root [preauth] Jan 12 06:28:08 host unix_chkpwd[9599]: password check failed for user (root) Jan 12 06:28:08 host sshd[9596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.69.85 user=root Jan 12 06:28:08 host sshd[9596]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 06:28:10 host sshd[9596]: Failed password for invalid user root from 51.250.69.85 port 42620 ssh2 Jan 12 06:28:10 host sshd[9596]: Received disconnect from 51.250.69.85 port 42620:11: Bye Bye [preauth] Jan 12 06:28:10 host sshd[9596]: Disconnected from 51.250.69.85 port 42620 [preauth] Jan 12 06:29:49 host sshd[9845]: User root from 202.165.15.167 not allowed because not listed in AllowUsers Jan 12 06:29:49 host sshd[9845]: input_userauth_request: invalid user root [preauth] Jan 12 06:29:49 host unix_chkpwd[9848]: password check failed for user (root) Jan 12 06:29:49 host sshd[9845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.165.15.167 user=root Jan 12 06:29:49 host sshd[9845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 06:29:50 host sshd[9845]: Failed password for invalid user root from 202.165.15.167 port 43374 ssh2 Jan 12 06:29:51 host sshd[9845]: Received disconnect from 202.165.15.167 port 43374:11: Bye Bye [preauth] Jan 12 06:29:51 host sshd[9845]: Disconnected from 202.165.15.167 port 43374 [preauth] Jan 12 06:30:01 host sshd[9889]: User root from 175.138.187.14 not allowed because not listed in AllowUsers Jan 12 06:30:01 host sshd[9889]: input_userauth_request: invalid user root [preauth] Jan 12 06:30:01 host unix_chkpwd[9891]: password check failed for user (root) Jan 12 06:30:01 host sshd[9889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.187.14 user=root Jan 12 06:30:01 host sshd[9889]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 06:30:02 host sshd[9889]: Failed password for invalid user root from 175.138.187.14 port 23142 ssh2 Jan 12 06:30:02 host sshd[9889]: Received disconnect from 175.138.187.14 port 23142:11: Bye Bye [preauth] Jan 12 06:30:02 host sshd[9889]: Disconnected from 175.138.187.14 port 23142 [preauth] Jan 12 06:30:44 host sshd[10047]: User root from 156.236.70.126 not allowed because not listed in AllowUsers Jan 12 06:30:44 host sshd[10047]: input_userauth_request: invalid user root [preauth] Jan 12 06:30:44 host unix_chkpwd[10050]: password check failed for user (root) Jan 12 06:30:44 host sshd[10047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.70.126 user=root Jan 12 06:30:44 host sshd[10047]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 06:30:46 host sshd[10047]: Failed password for invalid user root from 156.236.70.126 port 45374 ssh2 Jan 12 06:30:46 host sshd[10047]: Received disconnect from 156.236.70.126 port 45374:11: Bye Bye [preauth] Jan 12 06:30:46 host sshd[10047]: Disconnected from 156.236.70.126 port 45374 [preauth] Jan 12 06:33:22 host sshd[10368]: User root from 212.145.210.150 not allowed because not listed in AllowUsers Jan 12 06:33:22 host sshd[10368]: input_userauth_request: invalid user root [preauth] Jan 12 06:33:22 host unix_chkpwd[10372]: password check failed for user (root) Jan 12 06:33:22 host sshd[10368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.210.150 user=root Jan 12 06:33:22 host sshd[10368]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 06:33:24 host sshd[10368]: Failed password for invalid user root from 212.145.210.150 port 50076 ssh2 Jan 12 06:33:25 host sshd[10368]: Received disconnect from 212.145.210.150 port 50076:11: Bye Bye [preauth] Jan 12 06:33:25 host sshd[10368]: Disconnected from 212.145.210.150 port 50076 [preauth] Jan 12 06:42:35 host sshd[11813]: Invalid user ubnt from 8.144.164.133 port 42763 Jan 12 06:42:35 host sshd[11813]: input_userauth_request: invalid user ubnt [preauth] Jan 12 06:42:39 host sshd[11813]: pam_unix(sshd:auth): check pass; user unknown Jan 12 06:42:39 host sshd[11813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.144.164.133 Jan 12 06:42:41 host sshd[11813]: Failed password for invalid user ubnt from 8.144.164.133 port 42763 ssh2 Jan 12 06:42:42 host sshd[11813]: Connection closed by 8.144.164.133 port 42763 [preauth] Jan 12 06:44:31 host sshd[12155]: Invalid user cv from 194.110.203.109 port 49268 Jan 12 06:44:31 host sshd[12155]: input_userauth_request: invalid user cv [preauth] Jan 12 06:44:31 host sshd[12155]: pam_unix(sshd:auth): check pass; user unknown Jan 12 06:44:31 host sshd[12155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 06:44:33 host sshd[12155]: Failed password for invalid user cv from 194.110.203.109 port 49268 ssh2 Jan 12 06:44:36 host sshd[12155]: pam_unix(sshd:auth): check pass; user unknown Jan 12 06:44:38 host sshd[12155]: Failed password for invalid user cv from 194.110.203.109 port 49268 ssh2 Jan 12 06:44:42 host sshd[12155]: pam_unix(sshd:auth): check pass; user unknown Jan 12 06:44:44 host sshd[12155]: Failed password for invalid user cv from 194.110.203.109 port 49268 ssh2 Jan 12 06:44:47 host sshd[12155]: Connection closed by 194.110.203.109 port 49268 [preauth] Jan 12 06:44:47 host sshd[12155]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 06:48:33 host sshd[12684]: Invalid user weijianjun from 120.224.32.14 port 19997 Jan 12 06:48:33 host sshd[12684]: input_userauth_request: invalid user weijianjun [preauth] Jan 12 06:48:33 host sshd[12684]: pam_unix(sshd:auth): check pass; user unknown Jan 12 06:48:33 host sshd[12684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.224.32.14 Jan 12 06:48:35 host sshd[12684]: Failed password for invalid user weijianjun from 120.224.32.14 port 19997 ssh2 Jan 12 06:48:37 host sshd[12684]: Received disconnect from 120.224.32.14 port 19997:11: Normal Shutdown, Thank you for playing [preauth] Jan 12 06:48:37 host sshd[12684]: Disconnected from 120.224.32.14 port 19997 [preauth] Jan 12 06:59:43 host sshd[14344]: Invalid user User from 41.76.170.194 port 57712 Jan 12 06:59:43 host sshd[14344]: input_userauth_request: invalid user User [preauth] Jan 12 06:59:44 host sshd[14344]: Failed none for invalid user User from 41.76.170.194 port 57712 ssh2 Jan 12 06:59:45 host sshd[14344]: Connection closed by 41.76.170.194 port 57712 [preauth] Jan 12 07:01:21 host sshd[14573]: Did not receive identification string from 154.89.5.116 port 46218 Jan 12 07:01:36 host sshd[14574]: Connection closed by 154.89.5.116 port 46356 [preauth] Jan 12 07:19:32 host sshd[17252]: Invalid user admin1 from 200.216.216.154 port 47763 Jan 12 07:19:32 host sshd[17252]: input_userauth_request: invalid user admin1 [preauth] Jan 12 07:19:33 host sshd[17252]: pam_unix(sshd:auth): check pass; user unknown Jan 12 07:19:33 host sshd[17252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.216.216.154 Jan 12 07:19:35 host sshd[17252]: Failed password for invalid user admin1 from 200.216.216.154 port 47763 ssh2 Jan 12 07:19:35 host sshd[17252]: Connection closed by 200.216.216.154 port 47763 [preauth] Jan 12 07:21:39 host sshd[17730]: Connection reset by 187.145.89.77 port 37450 [preauth] Jan 12 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 07:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwresourcehunte user-3=keralaholi user-4=wwwrmswll user-5=ugotscom user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=cochintaxi user-11=wwwkaretakers user-12=palco123 user-13=gifterman user-14=kottayamcalldriv user-15=phmetals user-16=mrsclean user-17=wwwnexidigital user-18=bonifacegroup user-19=wwwevmhonda user-20=straightcurve user-21=wwwletsstalkfood user-22=vfmassets user-23=shalinijames user-24=wwwtestugo user-25=pmcresources user-26=disposeat user-27=wwwkmaorg user-28=remysagr user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 07:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0B72nRjUG9byZe8I.~ Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0B72nRjUG9byZe8I.~' Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0B72nRjUG9byZe8I.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 07:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 07:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 07:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 07:33:05 host sshd[19853]: Did not receive identification string from 85.31.46.253 port 34170 Jan 12 07:35:20 host sshd[20206]: User root from 128.199.186.230 not allowed because not listed in AllowUsers Jan 12 07:35:20 host sshd[20206]: input_userauth_request: invalid user root [preauth] Jan 12 07:35:20 host unix_chkpwd[20208]: password check failed for user (root) Jan 12 07:35:20 host sshd[20206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.186.230 user=root Jan 12 07:35:20 host sshd[20206]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 07:35:22 host sshd[20206]: Failed password for invalid user root from 128.199.186.230 port 40333 ssh2 Jan 12 07:35:22 host sshd[20206]: Received disconnect from 128.199.186.230 port 40333:11: Bye Bye [preauth] Jan 12 07:35:22 host sshd[20206]: Disconnected from 128.199.186.230 port 40333 [preauth] Jan 12 07:35:58 host sshd[20277]: User root from 103.90.227.206 not allowed because not listed in AllowUsers Jan 12 07:35:58 host sshd[20277]: input_userauth_request: invalid user root [preauth] Jan 12 07:35:58 host unix_chkpwd[20280]: password check failed for user (root) Jan 12 07:35:58 host sshd[20277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.90.227.206 user=root Jan 12 07:35:58 host sshd[20277]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 07:35:59 host sshd[20277]: Failed password for invalid user root from 103.90.227.206 port 42996 ssh2 Jan 12 07:35:59 host sshd[20277]: Received disconnect from 103.90.227.206 port 42996:11: Bye Bye [preauth] Jan 12 07:35:59 host sshd[20277]: Disconnected from 103.90.227.206 port 42996 [preauth] Jan 12 07:37:52 host sshd[20719]: User root from 36.91.119.221 not allowed because not listed in AllowUsers Jan 12 07:37:52 host sshd[20719]: input_userauth_request: invalid user root [preauth] Jan 12 07:37:52 host unix_chkpwd[20725]: password check failed for user (root) Jan 12 07:37:52 host sshd[20719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.119.221 user=root Jan 12 07:37:52 host sshd[20719]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 07:37:55 host sshd[20719]: Failed password for invalid user root from 36.91.119.221 port 38564 ssh2 Jan 12 07:37:55 host sshd[20719]: Received disconnect from 36.91.119.221 port 38564:11: Bye Bye [preauth] Jan 12 07:37:55 host sshd[20719]: Disconnected from 36.91.119.221 port 38564 [preauth] Jan 12 07:39:14 host sshd[21024]: Invalid user <empty> from 186.201.5.78 port 59912 Jan 12 07:39:14 host sshd[21024]: input_userauth_request: invalid user <empty> [preauth] Jan 12 07:39:15 host sshd[21024]: pam_unix(sshd:auth): check pass; user unknown Jan 12 07:39:15 host sshd[21024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.201.5.78 Jan 12 07:39:16 host sshd[21024]: Failed password for invalid user <empty> from 186.201.5.78 port 59912 ssh2 Jan 12 07:39:17 host sshd[21024]: Connection closed by 186.201.5.78 port 59912 [preauth] Jan 12 07:41:03 host sshd[21438]: User root from 128.199.186.230 not allowed because not listed in AllowUsers Jan 12 07:41:03 host sshd[21438]: input_userauth_request: invalid user root [preauth] Jan 12 07:41:03 host unix_chkpwd[21442]: password check failed for user (root) Jan 12 07:41:03 host sshd[21438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.186.230 user=root Jan 12 07:41:03 host sshd[21438]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 07:41:04 host sshd[21438]: Failed password for invalid user root from 128.199.186.230 port 35469 ssh2 Jan 12 07:41:04 host sshd[21438]: Received disconnect from 128.199.186.230 port 35469:11: Bye Bye [preauth] Jan 12 07:41:04 host sshd[21438]: Disconnected from 128.199.186.230 port 35469 [preauth] Jan 12 07:41:06 host sshd[21480]: User root from 103.90.227.206 not allowed because not listed in AllowUsers Jan 12 07:41:06 host sshd[21480]: input_userauth_request: invalid user root [preauth] Jan 12 07:41:06 host unix_chkpwd[21485]: password check failed for user (root) Jan 12 07:41:06 host sshd[21480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.90.227.206 user=root Jan 12 07:41:06 host sshd[21480]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 07:41:08 host sshd[21480]: Failed password for invalid user root from 103.90.227.206 port 48454 ssh2 Jan 12 07:41:08 host sshd[21480]: Received disconnect from 103.90.227.206 port 48454:11: Bye Bye [preauth] Jan 12 07:41:08 host sshd[21480]: Disconnected from 103.90.227.206 port 48454 [preauth] Jan 12 07:41:16 host sshd[21639]: User root from 36.91.119.221 not allowed because not listed in AllowUsers Jan 12 07:41:16 host sshd[21639]: input_userauth_request: invalid user root [preauth] Jan 12 07:41:16 host unix_chkpwd[21645]: password check failed for user (root) Jan 12 07:41:16 host sshd[21639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.119.221 user=root Jan 12 07:41:16 host sshd[21639]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 07:41:17 host sshd[21639]: Failed password for invalid user root from 36.91.119.221 port 44654 ssh2 Jan 12 07:41:17 host sshd[21639]: Received disconnect from 36.91.119.221 port 44654:11: Bye Bye [preauth] Jan 12 07:41:17 host sshd[21639]: Disconnected from 36.91.119.221 port 44654 [preauth] Jan 12 08:08:30 host sshd[26530]: Invalid user phillip from 107.189.30.59 port 59940 Jan 12 08:08:30 host sshd[26530]: input_userauth_request: invalid user phillip [preauth] Jan 12 08:08:30 host sshd[26530]: pam_unix(sshd:auth): check pass; user unknown Jan 12 08:08:30 host sshd[26530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 12 08:08:31 host sshd[26530]: Failed password for invalid user phillip from 107.189.30.59 port 59940 ssh2 Jan 12 08:08:32 host sshd[26530]: Connection closed by 107.189.30.59 port 59940 [preauth] Jan 12 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 08:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=shalinijames user-19=wwwtestugo user-20=vfmassets user-21=straightcurve user-22=wwwletsstalkfood user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=phmetals user-28=kottayamcalldriv user-29=palco123 user-30=gifterman feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 08:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OFxM5iKt2lMfsjF8.~ Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OFxM5iKt2lMfsjF8.~' Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OFxM5iKt2lMfsjF8.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 08:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 08:40:44 host sshd[31836]: Invalid user cw from 194.110.203.109 port 50612 Jan 12 08:40:44 host sshd[31836]: input_userauth_request: invalid user cw [preauth] Jan 12 08:40:44 host sshd[31836]: pam_unix(sshd:auth): check pass; user unknown Jan 12 08:40:44 host sshd[31836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 08:40:46 host sshd[31836]: Failed password for invalid user cw from 194.110.203.109 port 50612 ssh2 Jan 12 08:40:49 host sshd[31836]: pam_unix(sshd:auth): check pass; user unknown Jan 12 08:40:51 host sshd[31836]: Failed password for invalid user cw from 194.110.203.109 port 50612 ssh2 Jan 12 08:40:54 host sshd[31836]: pam_unix(sshd:auth): check pass; user unknown Jan 12 08:40:57 host sshd[31836]: Failed password for invalid user cw from 194.110.203.109 port 50612 ssh2 Jan 12 08:41:00 host sshd[31836]: Connection closed by 194.110.203.109 port 50612 [preauth] Jan 12 08:41:00 host sshd[31836]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 08:42:54 host sshd[32191]: Did not receive identification string from 85.31.46.253 port 50584 Jan 12 09:00:13 host sshd[2467]: User root from 129.205.210.162 not allowed because not listed in AllowUsers Jan 12 09:00:13 host sshd[2467]: input_userauth_request: invalid user root [preauth] Jan 12 09:00:14 host unix_chkpwd[2518]: password check failed for user (root) Jan 12 09:00:14 host sshd[2467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.210.162 user=root Jan 12 09:00:14 host sshd[2467]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:00:16 host sshd[2467]: Failed password for invalid user root from 129.205.210.162 port 51893 ssh2 Jan 12 09:00:18 host sshd[2467]: Connection closed by 129.205.210.162 port 51893 [preauth] Jan 12 09:14:05 host sshd[4833]: User root from 185.17.229.65 not allowed because not listed in AllowUsers Jan 12 09:14:05 host sshd[4833]: input_userauth_request: invalid user root [preauth] Jan 12 09:14:05 host unix_chkpwd[4838]: password check failed for user (root) Jan 12 09:14:05 host sshd[4833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.17.229.65 user=root Jan 12 09:14:05 host sshd[4833]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:14:07 host sshd[4833]: Failed password for invalid user root from 185.17.229.65 port 20880 ssh2 Jan 12 09:14:07 host sshd[4837]: Invalid user telnet from 119.93.177.139 port 55657 Jan 12 09:14:07 host sshd[4837]: input_userauth_request: invalid user telnet [preauth] Jan 12 09:14:07 host sshd[4837]: pam_unix(sshd:auth): check pass; user unknown Jan 12 09:14:07 host sshd[4837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.93.177.139 Jan 12 09:14:07 host sshd[4833]: Received disconnect from 185.17.229.65 port 20880:11: Bye Bye [preauth] Jan 12 09:14:07 host sshd[4833]: Disconnected from 185.17.229.65 port 20880 [preauth] Jan 12 09:14:09 host sshd[4837]: Failed password for invalid user telnet from 119.93.177.139 port 55657 ssh2 Jan 12 09:14:10 host sshd[4837]: pam_unix(sshd:auth): check pass; user unknown Jan 12 09:14:12 host sshd[4837]: Failed password for invalid user telnet from 119.93.177.139 port 55657 ssh2 Jan 12 09:14:12 host sshd[4837]: Connection reset by 119.93.177.139 port 55657 [preauth] Jan 12 09:14:12 host sshd[4837]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.93.177.139 Jan 12 09:16:42 host sshd[5164]: User root from 185.17.229.65 not allowed because not listed in AllowUsers Jan 12 09:16:42 host sshd[5164]: input_userauth_request: invalid user root [preauth] Jan 12 09:16:42 host unix_chkpwd[5167]: password check failed for user (root) Jan 12 09:16:42 host sshd[5164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.17.229.65 user=root Jan 12 09:16:42 host sshd[5164]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:16:44 host sshd[5164]: Failed password for invalid user root from 185.17.229.65 port 34051 ssh2 Jan 12 09:20:05 host sshd[5673]: Invalid user ubnt from 103.184.40.248 port 34050 Jan 12 09:20:05 host sshd[5673]: input_userauth_request: invalid user ubnt [preauth] Jan 12 09:20:05 host sshd[5673]: pam_unix(sshd:auth): check pass; user unknown Jan 12 09:20:05 host sshd[5673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.184.40.248 Jan 12 09:20:08 host sshd[5673]: Failed password for invalid user ubnt from 103.184.40.248 port 34050 ssh2 Jan 12 09:20:08 host sshd[5673]: Connection closed by 103.184.40.248 port 34050 [preauth] Jan 12 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 09:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=straightcurve user-4=wwwletsstalkfood user-5=gifterman user-6=palco123 user-7=kottayamcalldriv user-8=phmetals user-9=wwwnexidigital user-10=mrsclean user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=vfmassets user-17=wwwtestugo user-18=shalinijames user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=ugotscom user-26=cochintaxi user-27=wwwkaretakers user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 09:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MgyWy8iluAxOEUK4.~ Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MgyWy8iluAxOEUK4.~' Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MgyWy8iluAxOEUK4.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 09:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 09:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 09:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 09:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 09:24:31 host sshd[6530]: Connection reset by 175.203.218.101 port 58649 [preauth] Jan 12 09:25:40 host sshd[6683]: Did not receive identification string from 113.214.1.10 port 53705 Jan 12 09:28:26 host sshd[7088]: Did not receive identification string from 85.31.46.253 port 58468 Jan 12 09:34:49 host sshd[8216]: Invalid user Admin from 121.186.51.50 port 45776 Jan 12 09:34:49 host sshd[8216]: input_userauth_request: invalid user Admin [preauth] Jan 12 09:34:49 host sshd[8216]: pam_unix(sshd:auth): check pass; user unknown Jan 12 09:34:49 host sshd[8216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.186.51.50 Jan 12 09:34:52 host sshd[8216]: Failed password for invalid user Admin from 121.186.51.50 port 45776 ssh2 Jan 12 09:34:52 host sshd[8216]: pam_unix(sshd:auth): check pass; user unknown Jan 12 09:34:55 host sshd[8216]: Failed password for invalid user Admin from 121.186.51.50 port 45776 ssh2 Jan 12 09:34:55 host sshd[8216]: Connection reset by 121.186.51.50 port 45776 [preauth] Jan 12 09:34:55 host sshd[8216]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.186.51.50 Jan 12 09:35:28 host sshd[8309]: User root from 208.109.12.76 not allowed because not listed in AllowUsers Jan 12 09:35:28 host sshd[8309]: input_userauth_request: invalid user root [preauth] Jan 12 09:35:28 host unix_chkpwd[8331]: password check failed for user (root) Jan 12 09:35:28 host sshd[8309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.12.76 user=root Jan 12 09:35:28 host sshd[8309]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:35:30 host sshd[8309]: Failed password for invalid user root from 208.109.12.76 port 54360 ssh2 Jan 12 09:35:30 host sshd[8309]: Received disconnect from 208.109.12.76 port 54360:11: Bye Bye [preauth] Jan 12 09:35:30 host sshd[8309]: Disconnected from 208.109.12.76 port 54360 [preauth] Jan 12 09:35:53 host sshd[8354]: Invalid user admin from 24.130.164.51 port 39658 Jan 12 09:35:53 host sshd[8354]: input_userauth_request: invalid user admin [preauth] Jan 12 09:35:53 host sshd[8354]: pam_unix(sshd:auth): check pass; user unknown Jan 12 09:35:53 host sshd[8354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.130.164.51 Jan 12 09:35:55 host sshd[8354]: Failed password for invalid user admin from 24.130.164.51 port 39658 ssh2 Jan 12 09:35:55 host sshd[8354]: Connection reset by 24.130.164.51 port 39658 [preauth] Jan 12 09:36:16 host sshd[8389]: User root from 189.127.173.52 not allowed because not listed in AllowUsers Jan 12 09:36:16 host sshd[8389]: input_userauth_request: invalid user root [preauth] Jan 12 09:36:16 host unix_chkpwd[8393]: password check failed for user (root) Jan 12 09:36:16 host sshd[8389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.127.173.52 user=root Jan 12 09:36:16 host sshd[8389]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:36:18 host sshd[8389]: Failed password for invalid user root from 189.127.173.52 port 53334 ssh2 Jan 12 09:36:18 host sshd[8389]: Received disconnect from 189.127.173.52 port 53334:11: Bye Bye [preauth] Jan 12 09:36:18 host sshd[8389]: Disconnected from 189.127.173.52 port 53334 [preauth] Jan 12 09:36:27 host sshd[8412]: User root from 164.92.167.86 not allowed because not listed in AllowUsers Jan 12 09:36:27 host sshd[8412]: input_userauth_request: invalid user root [preauth] Jan 12 09:36:27 host unix_chkpwd[8415]: password check failed for user (root) Jan 12 09:36:27 host sshd[8412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.167.86 user=root Jan 12 09:36:27 host sshd[8412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:36:29 host sshd[8412]: Failed password for invalid user root from 164.92.167.86 port 60890 ssh2 Jan 12 09:36:29 host sshd[8412]: Received disconnect from 164.92.167.86 port 60890:11: Bye Bye [preauth] Jan 12 09:36:29 host sshd[8412]: Disconnected from 164.92.167.86 port 60890 [preauth] Jan 12 09:37:10 host sshd[8508]: User root from 139.59.0.163 not allowed because not listed in AllowUsers Jan 12 09:37:10 host sshd[8508]: input_userauth_request: invalid user root [preauth] Jan 12 09:37:10 host unix_chkpwd[8510]: password check failed for user (root) Jan 12 09:37:10 host sshd[8508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.0.163 user=root Jan 12 09:37:10 host sshd[8508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:37:12 host sshd[8508]: Failed password for invalid user root from 139.59.0.163 port 50436 ssh2 Jan 12 09:37:12 host sshd[8508]: Received disconnect from 139.59.0.163 port 50436:11: Bye Bye [preauth] Jan 12 09:37:12 host sshd[8508]: Disconnected from 139.59.0.163 port 50436 [preauth] Jan 12 09:37:35 host sshd[8558]: User root from 158.69.111.17 not allowed because not listed in AllowUsers Jan 12 09:37:35 host sshd[8558]: input_userauth_request: invalid user root [preauth] Jan 12 09:37:35 host unix_chkpwd[8561]: password check failed for user (root) Jan 12 09:37:35 host sshd[8558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.111.17 user=root Jan 12 09:37:35 host sshd[8558]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:37:37 host sshd[8558]: Failed password for invalid user root from 158.69.111.17 port 44518 ssh2 Jan 12 09:37:37 host sshd[8558]: Received disconnect from 158.69.111.17 port 44518:11: Bye Bye [preauth] Jan 12 09:37:37 host sshd[8558]: Disconnected from 158.69.111.17 port 44518 [preauth] Jan 12 09:39:37 host sshd[8794]: User root from 93.118.109.57 not allowed because not listed in AllowUsers Jan 12 09:39:37 host sshd[8794]: input_userauth_request: invalid user root [preauth] Jan 12 09:39:40 host unix_chkpwd[8901]: password check failed for user (root) Jan 12 09:39:40 host sshd[8794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.118.109.57 user=root Jan 12 09:39:40 host sshd[8794]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:39:42 host sshd[8794]: Failed password for invalid user root from 93.118.109.57 port 46320 ssh2 Jan 12 09:39:48 host sshd[8909]: User root from 43.153.184.188 not allowed because not listed in AllowUsers Jan 12 09:39:48 host sshd[8909]: input_userauth_request: invalid user root [preauth] Jan 12 09:39:48 host unix_chkpwd[8912]: password check failed for user (root) Jan 12 09:39:48 host sshd[8909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.184.188 user=root Jan 12 09:39:48 host sshd[8909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:39:49 host sshd[8794]: Connection closed by 93.118.109.57 port 46320 [preauth] Jan 12 09:39:51 host sshd[8909]: Failed password for invalid user root from 43.153.184.188 port 35058 ssh2 Jan 12 09:39:51 host sshd[8909]: Received disconnect from 43.153.184.188 port 35058:11: Bye Bye [preauth] Jan 12 09:39:51 host sshd[8909]: Disconnected from 43.153.184.188 port 35058 [preauth] Jan 12 09:40:30 host sshd[8995]: User root from 164.92.167.86 not allowed because not listed in AllowUsers Jan 12 09:40:30 host sshd[8995]: input_userauth_request: invalid user root [preauth] Jan 12 09:40:30 host unix_chkpwd[9018]: password check failed for user (root) Jan 12 09:40:30 host sshd[8995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.167.86 user=root Jan 12 09:40:30 host sshd[8995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:40:32 host sshd[8995]: Failed password for invalid user root from 164.92.167.86 port 51346 ssh2 Jan 12 09:40:33 host sshd[8995]: Received disconnect from 164.92.167.86 port 51346:11: Bye Bye [preauth] Jan 12 09:40:33 host sshd[8995]: Disconnected from 164.92.167.86 port 51346 [preauth] Jan 12 09:40:57 host sshd[9084]: User root from 208.109.12.76 not allowed because not listed in AllowUsers Jan 12 09:40:57 host sshd[9084]: input_userauth_request: invalid user root [preauth] Jan 12 09:40:57 host unix_chkpwd[9086]: password check failed for user (root) Jan 12 09:40:57 host sshd[9084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.12.76 user=root Jan 12 09:40:57 host sshd[9084]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:40:59 host sshd[9084]: Failed password for invalid user root from 208.109.12.76 port 53402 ssh2 Jan 12 09:40:59 host sshd[9084]: Received disconnect from 208.109.12.76 port 53402:11: Bye Bye [preauth] Jan 12 09:40:59 host sshd[9084]: Disconnected from 208.109.12.76 port 53402 [preauth] Jan 12 09:42:07 host sshd[9260]: User root from 189.127.173.52 not allowed because not listed in AllowUsers Jan 12 09:42:07 host sshd[9260]: input_userauth_request: invalid user root [preauth] Jan 12 09:42:07 host unix_chkpwd[9263]: password check failed for user (root) Jan 12 09:42:07 host sshd[9260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.127.173.52 user=root Jan 12 09:42:07 host sshd[9260]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:42:09 host sshd[9260]: Failed password for invalid user root from 189.127.173.52 port 38502 ssh2 Jan 12 09:42:09 host sshd[9260]: Received disconnect from 189.127.173.52 port 38502:11: Bye Bye [preauth] Jan 12 09:42:09 host sshd[9260]: Disconnected from 189.127.173.52 port 38502 [preauth] Jan 12 09:43:28 host sshd[9482]: User root from 158.69.111.17 not allowed because not listed in AllowUsers Jan 12 09:43:28 host sshd[9482]: input_userauth_request: invalid user root [preauth] Jan 12 09:43:28 host unix_chkpwd[9485]: password check failed for user (root) Jan 12 09:43:28 host sshd[9482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.111.17 user=root Jan 12 09:43:28 host sshd[9482]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:43:30 host sshd[9482]: Failed password for invalid user root from 158.69.111.17 port 37710 ssh2 Jan 12 09:43:31 host sshd[9540]: User root from 43.153.184.188 not allowed because not listed in AllowUsers Jan 12 09:43:31 host sshd[9540]: input_userauth_request: invalid user root [preauth] Jan 12 09:43:31 host unix_chkpwd[9543]: password check failed for user (root) Jan 12 09:43:31 host sshd[9540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.184.188 user=root Jan 12 09:43:31 host sshd[9540]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:43:33 host sshd[9540]: Failed password for invalid user root from 43.153.184.188 port 45654 ssh2 Jan 12 09:43:34 host sshd[9540]: Received disconnect from 43.153.184.188 port 45654:11: Bye Bye [preauth] Jan 12 09:43:34 host sshd[9540]: Disconnected from 43.153.184.188 port 45654 [preauth] Jan 12 09:49:01 host sshd[10261]: User root from 139.59.0.163 not allowed because not listed in AllowUsers Jan 12 09:49:01 host sshd[10261]: input_userauth_request: invalid user root [preauth] Jan 12 09:49:01 host unix_chkpwd[10263]: password check failed for user (root) Jan 12 09:49:01 host sshd[10261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.0.163 user=root Jan 12 09:49:01 host sshd[10261]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:49:04 host sshd[10261]: Failed password for invalid user root from 139.59.0.163 port 47054 ssh2 Jan 12 09:49:04 host sshd[10261]: Received disconnect from 139.59.0.163 port 47054:11: Bye Bye [preauth] Jan 12 09:49:04 host sshd[10261]: Disconnected from 139.59.0.163 port 47054 [preauth] Jan 12 09:54:43 host sshd[11054]: Invalid user ro from 205.185.113.129 port 33916 Jan 12 09:54:43 host sshd[11054]: input_userauth_request: invalid user ro [preauth] Jan 12 09:54:43 host sshd[11054]: pam_unix(sshd:auth): check pass; user unknown Jan 12 09:54:43 host sshd[11054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 12 09:54:46 host sshd[11054]: Failed password for invalid user ro from 205.185.113.129 port 33916 ssh2 Jan 12 09:54:46 host sshd[11054]: Connection closed by 205.185.113.129 port 33916 [preauth] Jan 12 09:58:30 host sshd[11605]: User root from 143.198.136.87 not allowed because not listed in AllowUsers Jan 12 09:58:30 host sshd[11605]: input_userauth_request: invalid user root [preauth] Jan 12 09:58:30 host unix_chkpwd[11610]: password check failed for user (root) Jan 12 09:58:30 host sshd[11605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.136.87 user=root Jan 12 09:58:30 host sshd[11605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:58:32 host sshd[11605]: Failed password for invalid user root from 143.198.136.87 port 54738 ssh2 Jan 12 09:58:33 host sshd[11605]: Received disconnect from 143.198.136.87 port 54738:11: Bye Bye [preauth] Jan 12 09:58:33 host sshd[11605]: Disconnected from 143.198.136.87 port 54738 [preauth] Jan 12 09:58:49 host sshd[11641]: User root from 205.185.113.140 not allowed because not listed in AllowUsers Jan 12 09:58:49 host sshd[11641]: input_userauth_request: invalid user root [preauth] Jan 12 09:58:49 host unix_chkpwd[11644]: password check failed for user (root) Jan 12 09:58:49 host sshd[11641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.140 user=root Jan 12 09:58:49 host sshd[11641]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 09:58:51 host sshd[11641]: Failed password for invalid user root from 205.185.113.140 port 38988 ssh2 Jan 12 09:58:52 host sshd[11641]: Received disconnect from 205.185.113.140 port 38988:11: Bye Bye [preauth] Jan 12 09:58:52 host sshd[11641]: Disconnected from 205.185.113.140 port 38988 [preauth] Jan 12 10:00:05 host sshd[11824]: Invalid user admin from 190.143.133.126 port 46953 Jan 12 10:00:05 host sshd[11824]: input_userauth_request: invalid user admin [preauth] Jan 12 10:00:05 host sshd[11824]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:00:05 host sshd[11824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.143.133.126 Jan 12 10:00:07 host sshd[11824]: Failed password for invalid user admin from 190.143.133.126 port 46953 ssh2 Jan 12 10:00:07 host sshd[11824]: Connection closed by 190.143.133.126 port 46953 [preauth] Jan 12 10:01:15 host sshd[11969]: User root from 129.226.209.222 not allowed because not listed in AllowUsers Jan 12 10:01:15 host sshd[11969]: input_userauth_request: invalid user root [preauth] Jan 12 10:01:15 host unix_chkpwd[11972]: password check failed for user (root) Jan 12 10:01:15 host sshd[11969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.209.222 user=root Jan 12 10:01:15 host sshd[11969]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:01:16 host sshd[11969]: Failed password for invalid user root from 129.226.209.222 port 57024 ssh2 Jan 12 10:01:16 host sshd[11969]: Received disconnect from 129.226.209.222 port 57024:11: Bye Bye [preauth] Jan 12 10:01:16 host sshd[11969]: Disconnected from 129.226.209.222 port 57024 [preauth] Jan 12 10:03:49 host sshd[12372]: User root from 205.185.113.140 not allowed because not listed in AllowUsers Jan 12 10:03:49 host sshd[12372]: input_userauth_request: invalid user root [preauth] Jan 12 10:03:49 host unix_chkpwd[12381]: password check failed for user (root) Jan 12 10:03:49 host sshd[12372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.140 user=root Jan 12 10:03:49 host sshd[12372]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:03:52 host sshd[12372]: Failed password for invalid user root from 205.185.113.140 port 36398 ssh2 Jan 12 10:04:17 host sshd[12452]: User root from 143.198.136.87 not allowed because not listed in AllowUsers Jan 12 10:04:17 host sshd[12452]: input_userauth_request: invalid user root [preauth] Jan 12 10:04:17 host unix_chkpwd[12456]: password check failed for user (root) Jan 12 10:04:17 host sshd[12452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.136.87 user=root Jan 12 10:04:17 host sshd[12452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:04:19 host sshd[12452]: Failed password for invalid user root from 143.198.136.87 port 52182 ssh2 Jan 12 10:04:20 host sshd[12452]: Received disconnect from 143.198.136.87 port 52182:11: Bye Bye [preauth] Jan 12 10:04:20 host sshd[12452]: Disconnected from 143.198.136.87 port 52182 [preauth] Jan 12 10:04:37 host sshd[12545]: User root from 129.226.209.222 not allowed because not listed in AllowUsers Jan 12 10:04:37 host sshd[12545]: input_userauth_request: invalid user root [preauth] Jan 12 10:04:37 host unix_chkpwd[12547]: password check failed for user (root) Jan 12 10:04:37 host sshd[12545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.209.222 user=root Jan 12 10:04:37 host sshd[12545]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:04:39 host sshd[12545]: Failed password for invalid user root from 129.226.209.222 port 42962 ssh2 Jan 12 10:04:39 host sshd[12545]: Received disconnect from 129.226.209.222 port 42962:11: Bye Bye [preauth] Jan 12 10:04:39 host sshd[12545]: Disconnected from 129.226.209.222 port 42962 [preauth] Jan 12 10:09:22 host sshd[13379]: Invalid user ONTUSER from 81.16.9.208 port 42118 Jan 12 10:09:22 host sshd[13379]: input_userauth_request: invalid user ONTUSER [preauth] Jan 12 10:09:22 host sshd[13379]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:09:22 host sshd[13379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.16.9.208 Jan 12 10:09:23 host sshd[13379]: Failed password for invalid user ONTUSER from 81.16.9.208 port 42118 ssh2 Jan 12 10:09:24 host sshd[13379]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:09:26 host sshd[13379]: Failed password for invalid user ONTUSER from 81.16.9.208 port 42118 ssh2 Jan 12 10:09:27 host sshd[13379]: Connection reset by 81.16.9.208 port 42118 [preauth] Jan 12 10:09:27 host sshd[13379]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.16.9.208 Jan 12 10:11:57 host sshd[13764]: Connection reset by 179.210.47.169 port 36225 [preauth] Jan 12 10:13:02 host sshd[13969]: Did not receive identification string from 85.31.46.253 port 58002 Jan 12 10:17:10 host sshd[14509]: Invalid user usr from 75.162.7.18 port 63761 Jan 12 10:17:10 host sshd[14509]: input_userauth_request: invalid user usr [preauth] Jan 12 10:17:10 host sshd[14509]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:17:10 host sshd[14509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.162.7.18 Jan 12 10:17:12 host sshd[14509]: Failed password for invalid user usr from 75.162.7.18 port 63761 ssh2 Jan 12 10:17:47 host sshd[14509]: Connection closed by 75.162.7.18 port 63761 [preauth] Jan 12 10:20:13 host sshd[15001]: Invalid user ubuntu from 88.249.30.108 port 37457 Jan 12 10:20:13 host sshd[15001]: input_userauth_request: invalid user ubuntu [preauth] Jan 12 10:20:13 host sshd[15001]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:20:13 host sshd[15001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.249.30.108 Jan 12 10:20:15 host sshd[15001]: Failed password for invalid user ubuntu from 88.249.30.108 port 37457 ssh2 Jan 12 10:20:26 host sshd[15095]: Invalid user user from 122.43.159.68 port 4259 Jan 12 10:20:26 host sshd[15095]: input_userauth_request: invalid user user [preauth] Jan 12 10:20:26 host sshd[15095]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:20:26 host sshd[15095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.43.159.68 Jan 12 10:20:29 host sshd[15095]: Failed password for invalid user user from 122.43.159.68 port 4259 ssh2 Jan 12 10:20:29 host sshd[15095]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:20:30 host sshd[15001]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:20:31 host sshd[15095]: Failed password for invalid user user from 122.43.159.68 port 4259 ssh2 Jan 12 10:20:31 host sshd[15095]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:20:32 host sshd[15001]: Failed password for invalid user ubuntu from 88.249.30.108 port 37457 ssh2 Jan 12 10:20:33 host sshd[15095]: Failed password for invalid user user from 122.43.159.68 port 4259 ssh2 Jan 12 10:20:33 host sshd[15095]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:20:35 host sshd[15095]: Failed password for invalid user user from 122.43.159.68 port 4259 ssh2 Jan 12 10:20:35 host sshd[15095]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:20:37 host sshd[15001]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:20:37 host sshd[15095]: Failed password for invalid user user from 122.43.159.68 port 4259 ssh2 Jan 12 10:20:39 host sshd[15001]: Failed password for invalid user ubuntu from 88.249.30.108 port 37457 ssh2 Jan 12 10:20:54 host sshd[15001]: Failed password for invalid user ubuntu from 88.249.30.108 port 37457 ssh2 Jan 12 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 10:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=wwwpmcresource user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=pmcresources user-16=wwwkmaorg user-17=disposeat user-18=remysagr user-19=wwwkapin user-20=woodpeck user-21=phmetals user-22=kottayamcalldriv user-23=gifterman user-24=palco123 user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 10:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Ck7TIW07pBUH7GU2.~ Jan 12 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Ck7TIW07pBUH7GU2.~' Jan 12 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Ck7TIW07pBUH7GU2.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 10:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 10:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 10:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 10:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 10:22:40 host sshd[15657]: Did not receive identification string from 148.72.247.138 port 57794 Jan 12 10:26:57 host sshd[16312]: User root from 162.241.69.101 not allowed because not listed in AllowUsers Jan 12 10:26:57 host sshd[16312]: input_userauth_request: invalid user root [preauth] Jan 12 10:26:57 host unix_chkpwd[16317]: password check failed for user (root) Jan 12 10:26:57 host sshd[16312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.69.101 user=root Jan 12 10:26:57 host sshd[16312]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:26:59 host sshd[16312]: Failed password for invalid user root from 162.241.69.101 port 41350 ssh2 Jan 12 10:26:59 host sshd[16312]: Received disconnect from 162.241.69.101 port 41350:11: Bye Bye [preauth] Jan 12 10:26:59 host sshd[16312]: Disconnected from 162.241.69.101 port 41350 [preauth] Jan 12 10:27:15 host sshd[16359]: User root from 51.91.78.31 not allowed because not listed in AllowUsers Jan 12 10:27:15 host sshd[16359]: input_userauth_request: invalid user root [preauth] Jan 12 10:27:15 host unix_chkpwd[16363]: password check failed for user (root) Jan 12 10:27:15 host sshd[16359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.78.31 user=root Jan 12 10:27:15 host sshd[16359]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:27:18 host sshd[16359]: Failed password for invalid user root from 51.91.78.31 port 60865 ssh2 Jan 12 10:27:18 host sshd[16359]: Received disconnect from 51.91.78.31 port 60865:11: Bye Bye [preauth] Jan 12 10:27:18 host sshd[16359]: Disconnected from 51.91.78.31 port 60865 [preauth] Jan 12 10:28:08 host sshd[16523]: User root from 159.223.32.24 not allowed because not listed in AllowUsers Jan 12 10:28:08 host sshd[16523]: input_userauth_request: invalid user root [preauth] Jan 12 10:28:08 host unix_chkpwd[16538]: password check failed for user (root) Jan 12 10:28:08 host sshd[16523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.32.24 user=root Jan 12 10:28:08 host sshd[16523]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:28:10 host sshd[16523]: Failed password for invalid user root from 159.223.32.24 port 46808 ssh2 Jan 12 10:28:10 host sshd[16523]: Received disconnect from 159.223.32.24 port 46808:11: Bye Bye [preauth] Jan 12 10:28:10 host sshd[16523]: Disconnected from 159.223.32.24 port 46808 [preauth] Jan 12 10:30:55 host sshd[16994]: User root from 202.46.29.76 not allowed because not listed in AllowUsers Jan 12 10:30:55 host sshd[16994]: input_userauth_request: invalid user root [preauth] Jan 12 10:30:55 host unix_chkpwd[16998]: password check failed for user (root) Jan 12 10:30:55 host sshd[16994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.46.29.76 user=root Jan 12 10:30:55 host sshd[16994]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:30:58 host sshd[16994]: Failed password for invalid user root from 202.46.29.76 port 32784 ssh2 Jan 12 10:30:58 host sshd[16994]: Received disconnect from 202.46.29.76 port 32784:11: Bye Bye [preauth] Jan 12 10:30:58 host sshd[16994]: Disconnected from 202.46.29.76 port 32784 [preauth] Jan 12 10:31:10 host sshd[17026]: User root from 162.241.69.101 not allowed because not listed in AllowUsers Jan 12 10:31:10 host sshd[17026]: input_userauth_request: invalid user root [preauth] Jan 12 10:31:10 host unix_chkpwd[17030]: password check failed for user (root) Jan 12 10:31:10 host sshd[17026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.69.101 user=root Jan 12 10:31:10 host sshd[17026]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:31:12 host sshd[17026]: Failed password for invalid user root from 162.241.69.101 port 33568 ssh2 Jan 12 10:31:27 host sshd[17078]: User root from 51.91.78.31 not allowed because not listed in AllowUsers Jan 12 10:31:27 host sshd[17078]: input_userauth_request: invalid user root [preauth] Jan 12 10:31:27 host unix_chkpwd[17089]: password check failed for user (root) Jan 12 10:31:27 host sshd[17078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.78.31 user=root Jan 12 10:31:27 host sshd[17078]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:31:29 host sshd[17078]: Failed password for invalid user root from 51.91.78.31 port 56160 ssh2 Jan 12 10:31:30 host sshd[17078]: Received disconnect from 51.91.78.31 port 56160:11: Bye Bye [preauth] Jan 12 10:31:30 host sshd[17078]: Disconnected from 51.91.78.31 port 56160 [preauth] Jan 12 10:32:28 host sshd[17274]: User root from 159.223.32.24 not allowed because not listed in AllowUsers Jan 12 10:32:28 host sshd[17274]: input_userauth_request: invalid user root [preauth] Jan 12 10:32:28 host unix_chkpwd[17277]: password check failed for user (root) Jan 12 10:32:28 host sshd[17274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.32.24 user=root Jan 12 10:32:28 host sshd[17274]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:32:29 host sshd[17274]: Failed password for invalid user root from 159.223.32.24 port 33058 ssh2 Jan 12 10:32:29 host sshd[17274]: Received disconnect from 159.223.32.24 port 33058:11: Bye Bye [preauth] Jan 12 10:32:29 host sshd[17274]: Disconnected from 159.223.32.24 port 33058 [preauth] Jan 12 10:34:20 host sshd[17660]: Invalid user cx from 194.110.203.109 port 51788 Jan 12 10:34:20 host sshd[17660]: input_userauth_request: invalid user cx [preauth] Jan 12 10:34:20 host sshd[17660]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:34:20 host sshd[17660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 10:34:23 host sshd[17660]: Failed password for invalid user cx from 194.110.203.109 port 51788 ssh2 Jan 12 10:34:26 host sshd[17660]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:34:28 host sshd[17660]: Failed password for invalid user cx from 194.110.203.109 port 51788 ssh2 Jan 12 10:34:31 host sshd[17660]: pam_unix(sshd:auth): check pass; user unknown Jan 12 10:34:33 host sshd[17660]: Failed password for invalid user cx from 194.110.203.109 port 51788 ssh2 Jan 12 10:34:36 host sshd[17660]: Connection closed by 194.110.203.109 port 51788 [preauth] Jan 12 10:34:36 host sshd[17660]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 10:37:56 host sshd[18164]: User root from 202.46.29.76 not allowed because not listed in AllowUsers Jan 12 10:37:56 host sshd[18164]: input_userauth_request: invalid user root [preauth] Jan 12 10:37:56 host unix_chkpwd[18167]: password check failed for user (root) Jan 12 10:37:56 host sshd[18164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.46.29.76 user=root Jan 12 10:37:56 host sshd[18164]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:37:58 host sshd[18164]: Failed password for invalid user root from 202.46.29.76 port 45528 ssh2 Jan 12 10:50:52 host sshd[20147]: User root from 82.208.20.137 not allowed because not listed in AllowUsers Jan 12 10:50:52 host sshd[20147]: input_userauth_request: invalid user root [preauth] Jan 12 10:50:52 host unix_chkpwd[20151]: password check failed for user (root) Jan 12 10:50:52 host sshd[20147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.208.20.137 user=root Jan 12 10:50:52 host sshd[20147]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:50:54 host sshd[20147]: Failed password for invalid user root from 82.208.20.137 port 40358 ssh2 Jan 12 10:50:54 host sshd[20147]: Received disconnect from 82.208.20.137 port 40358:11: Bye Bye [preauth] Jan 12 10:50:54 host sshd[20147]: Disconnected from 82.208.20.137 port 40358 [preauth] Jan 12 10:50:59 host sshd[20158]: User root from 162.240.31.154 not allowed because not listed in AllowUsers Jan 12 10:50:59 host sshd[20158]: input_userauth_request: invalid user root [preauth] Jan 12 10:50:59 host unix_chkpwd[20161]: password check failed for user (root) Jan 12 10:50:59 host sshd[20158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.240.31.154 user=root Jan 12 10:50:59 host sshd[20158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:51:01 host sshd[20158]: Failed password for invalid user root from 162.240.31.154 port 43490 ssh2 Jan 12 10:51:01 host sshd[20158]: Received disconnect from 162.240.31.154 port 43490:11: Bye Bye [preauth] Jan 12 10:51:01 host sshd[20158]: Disconnected from 162.240.31.154 port 43490 [preauth] Jan 12 10:51:20 host sshd[20199]: User root from 190.144.139.235 not allowed because not listed in AllowUsers Jan 12 10:51:20 host sshd[20199]: input_userauth_request: invalid user root [preauth] Jan 12 10:51:20 host unix_chkpwd[20203]: password check failed for user (root) Jan 12 10:51:20 host sshd[20199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.139.235 user=root Jan 12 10:51:20 host sshd[20199]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:51:22 host sshd[20199]: Failed password for invalid user root from 190.144.139.235 port 39342 ssh2 Jan 12 10:51:22 host sshd[20199]: Received disconnect from 190.144.139.235 port 39342:11: Bye Bye [preauth] Jan 12 10:51:22 host sshd[20199]: Disconnected from 190.144.139.235 port 39342 [preauth] Jan 12 10:53:40 host sshd[20623]: User root from 181.191.206.234 not allowed because not listed in AllowUsers Jan 12 10:53:40 host sshd[20623]: input_userauth_request: invalid user root [preauth] Jan 12 10:53:40 host unix_chkpwd[20627]: password check failed for user (root) Jan 12 10:53:40 host sshd[20623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.206.234 user=root Jan 12 10:53:40 host sshd[20623]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:53:42 host sshd[20623]: Failed password for invalid user root from 181.191.206.234 port 36580 ssh2 Jan 12 10:53:42 host sshd[20623]: Received disconnect from 181.191.206.234 port 36580:11: Bye Bye [preauth] Jan 12 10:53:42 host sshd[20623]: Disconnected from 181.191.206.234 port 36580 [preauth] Jan 12 10:55:21 host sshd[20822]: Did not receive identification string from 109.74.204.123 port 42584 Jan 12 10:55:28 host sshd[20836]: User root from 190.144.139.235 not allowed because not listed in AllowUsers Jan 12 10:55:28 host sshd[20836]: input_userauth_request: invalid user root [preauth] Jan 12 10:55:28 host unix_chkpwd[20872]: password check failed for user (root) Jan 12 10:55:28 host sshd[20836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.139.235 user=root Jan 12 10:55:28 host sshd[20836]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:55:30 host sshd[20836]: Failed password for invalid user root from 190.144.139.235 port 60632 ssh2 Jan 12 10:55:30 host sshd[20836]: Received disconnect from 190.144.139.235 port 60632:11: Bye Bye [preauth] Jan 12 10:55:30 host sshd[20836]: Disconnected from 190.144.139.235 port 60632 [preauth] Jan 12 10:56:57 host sshd[21164]: User root from 82.208.20.137 not allowed because not listed in AllowUsers Jan 12 10:56:57 host sshd[21164]: input_userauth_request: invalid user root [preauth] Jan 12 10:56:57 host unix_chkpwd[21170]: password check failed for user (root) Jan 12 10:56:57 host sshd[21164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.208.20.137 user=root Jan 12 10:56:57 host sshd[21164]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:56:58 host sshd[21164]: Failed password for invalid user root from 82.208.20.137 port 43568 ssh2 Jan 12 10:57:01 host sshd[21227]: Did not receive identification string from 109.74.204.123 port 52030 Jan 12 10:57:03 host sshd[21230]: Connection closed by 109.74.204.123 port 52536 [preauth] Jan 12 10:57:05 host sshd[21262]: Did not receive identification string from 109.74.204.123 port 37752 Jan 12 10:57:10 host sshd[21271]: User root from 181.191.206.234 not allowed because not listed in AllowUsers Jan 12 10:57:10 host sshd[21271]: input_userauth_request: invalid user root [preauth] Jan 12 10:57:10 host unix_chkpwd[21274]: password check failed for user (root) Jan 12 10:57:10 host sshd[21271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.206.234 user=root Jan 12 10:57:10 host sshd[21271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:57:12 host sshd[21271]: Failed password for invalid user root from 181.191.206.234 port 48436 ssh2 Jan 12 10:57:53 host sshd[21478]: Did not receive identification string from 149.129.220.222 port 61000 Jan 12 10:58:17 host sshd[21538]: User root from 162.240.31.154 not allowed because not listed in AllowUsers Jan 12 10:58:17 host sshd[21538]: input_userauth_request: invalid user root [preauth] Jan 12 10:58:17 host unix_chkpwd[21543]: password check failed for user (root) Jan 12 10:58:17 host sshd[21538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.240.31.154 user=root Jan 12 10:58:17 host sshd[21538]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 10:58:19 host sshd[21538]: Failed password for invalid user root from 162.240.31.154 port 42256 ssh2 Jan 12 10:58:20 host sshd[21538]: Received disconnect from 162.240.31.154 port 42256:11: Bye Bye [preauth] Jan 12 10:58:20 host sshd[21538]: Disconnected from 162.240.31.154 port 42256 [preauth] Jan 12 11:20:59 host sshd[24705]: Invalid user zyfwp from 211.230.109.212 port 52215 Jan 12 11:20:59 host sshd[24705]: input_userauth_request: invalid user zyfwp [preauth] Jan 12 11:20:59 host sshd[24705]: pam_unix(sshd:auth): check pass; user unknown Jan 12 11:20:59 host sshd[24705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.230.109.212 Jan 12 11:21:00 host sshd[24705]: Failed password for invalid user zyfwp from 211.230.109.212 port 52215 ssh2 Jan 12 11:21:01 host sshd[24705]: Connection reset by 211.230.109.212 port 52215 [preauth] Jan 12 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 11:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=keralaholi user-29=wwwresourcehunte user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 11:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5qDx5S48QeFCIbd1.~ Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5qDx5S48QeFCIbd1.~' Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5qDx5S48QeFCIbd1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 11:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 11:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 11:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 11:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 11:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 11:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 11:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 11:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 11:37:26 host sshd[27490]: User ftp from 183.107.30.63 not allowed because not listed in AllowUsers Jan 12 11:37:26 host sshd[27490]: input_userauth_request: invalid user ftp [preauth] Jan 12 11:37:26 host unix_chkpwd[27496]: password check failed for user (ftp) Jan 12 11:37:26 host sshd[27490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.107.30.63 user=ftp Jan 12 11:37:26 host sshd[27490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 12 11:37:28 host sshd[27490]: Failed password for invalid user ftp from 183.107.30.63 port 36846 ssh2 Jan 12 11:37:30 host unix_chkpwd[27526]: password check failed for user (ftp) Jan 12 11:37:30 host sshd[27490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 12 11:37:32 host sshd[27490]: Failed password for invalid user ftp from 183.107.30.63 port 36846 ssh2 Jan 12 11:37:33 host unix_chkpwd[27532]: password check failed for user (ftp) Jan 12 11:37:33 host sshd[27490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 12 11:37:34 host sshd[27490]: Failed password for invalid user ftp from 183.107.30.63 port 36846 ssh2 Jan 12 11:37:35 host sshd[27490]: Failed password for invalid user ftp from 183.107.30.63 port 36846 ssh2 Jan 12 11:37:36 host unix_chkpwd[27537]: password check failed for user (ftp) Jan 12 11:37:36 host sshd[27490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 12 11:37:38 host sshd[27490]: Failed password for invalid user ftp from 183.107.30.63 port 36846 ssh2 Jan 12 11:37:40 host unix_chkpwd[27562]: password check failed for user (ftp) Jan 12 11:37:40 host sshd[27490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 12 11:37:41 host sshd[27490]: Failed password for invalid user ftp from 183.107.30.63 port 36846 ssh2 Jan 12 11:37:41 host sshd[27490]: error: maximum authentication attempts exceeded for invalid user ftp from 183.107.30.63 port 36846 ssh2 [preauth] Jan 12 11:37:41 host sshd[27490]: Disconnecting: Too many authentication failures [preauth] Jan 12 11:37:41 host sshd[27490]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.107.30.63 user=ftp Jan 12 11:37:41 host sshd[27490]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 12 11:51:24 host sshd[29721]: User root from 186.233.210.86 not allowed because not listed in AllowUsers Jan 12 11:51:24 host sshd[29721]: input_userauth_request: invalid user root [preauth] Jan 12 11:51:24 host unix_chkpwd[29725]: password check failed for user (root) Jan 12 11:51:24 host sshd[29721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.233.210.86 user=root Jan 12 11:51:24 host sshd[29721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 11:51:26 host sshd[29721]: Failed password for invalid user root from 186.233.210.86 port 39704 ssh2 Jan 12 11:51:26 host sshd[29721]: Received disconnect from 186.233.210.86 port 39704:11: Bye Bye [preauth] Jan 12 11:51:26 host sshd[29721]: Disconnected from 186.233.210.86 port 39704 [preauth] Jan 12 11:56:31 host sshd[30534]: Invalid user ONTUSER from 121.165.81.20 port 63581 Jan 12 11:56:31 host sshd[30534]: input_userauth_request: invalid user ONTUSER [preauth] Jan 12 11:56:31 host sshd[30534]: pam_unix(sshd:auth): check pass; user unknown Jan 12 11:56:31 host sshd[30534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.165.81.20 Jan 12 11:56:33 host sshd[30534]: Failed password for invalid user ONTUSER from 121.165.81.20 port 63581 ssh2 Jan 12 11:56:34 host sshd[30534]: pam_unix(sshd:auth): check pass; user unknown Jan 12 11:56:36 host sshd[30534]: Failed password for invalid user ONTUSER from 121.165.81.20 port 63581 ssh2 Jan 12 11:56:38 host sshd[30534]: Failed password for invalid user ONTUSER from 121.165.81.20 port 63581 ssh2 Jan 12 11:56:39 host sshd[30534]: Connection closed by 121.165.81.20 port 63581 [preauth] Jan 12 11:56:39 host sshd[30534]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.165.81.20 Jan 12 11:58:37 host sshd[30832]: User root from 186.233.210.86 not allowed because not listed in AllowUsers Jan 12 11:58:37 host sshd[30832]: input_userauth_request: invalid user root [preauth] Jan 12 11:58:37 host unix_chkpwd[30836]: password check failed for user (root) Jan 12 11:58:37 host sshd[30832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.233.210.86 user=root Jan 12 11:58:37 host sshd[30832]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 11:58:39 host sshd[30832]: Failed password for invalid user root from 186.233.210.86 port 40242 ssh2 Jan 12 12:13:22 host sshd[1523]: Did not receive identification string from 172.105.128.11 port 25130 Jan 12 12:13:23 host sshd[1528]: Did not receive identification string from 172.105.128.11 port 25146 Jan 12 12:13:26 host sshd[1531]: Connection closed by 172.105.128.11 port 25160 [preauth] Jan 12 12:17:44 host sshd[2301]: Invalid user pi from 125.242.57.61 port 41696 Jan 12 12:17:44 host sshd[2301]: input_userauth_request: invalid user pi [preauth] Jan 12 12:17:44 host sshd[2301]: pam_unix(sshd:auth): check pass; user unknown Jan 12 12:17:44 host sshd[2301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.242.57.61 Jan 12 12:17:46 host sshd[2301]: Failed password for invalid user pi from 125.242.57.61 port 41696 ssh2 Jan 12 12:17:47 host sshd[2301]: pam_unix(sshd:auth): check pass; user unknown Jan 12 12:17:48 host sshd[2301]: Failed password for invalid user pi from 125.242.57.61 port 41696 ssh2 Jan 12 12:17:50 host sshd[2301]: pam_unix(sshd:auth): check pass; user unknown Jan 12 12:17:52 host sshd[2301]: Failed password for invalid user pi from 125.242.57.61 port 41696 ssh2 Jan 12 12:17:53 host sshd[2301]: pam_unix(sshd:auth): check pass; user unknown Jan 12 12:17:55 host sshd[2301]: Failed password for invalid user pi from 125.242.57.61 port 41696 ssh2 Jan 12 12:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 12:21:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:21:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 12:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 12:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=shalinijames user-7=wwwtestugo user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=straightcurve user-13=wwwletsstalkfood user-14=phmetals user-15=kottayamcalldriv user-16=palco123 user-17=gifterman user-18=wwwnexidigital user-19=mrsclean user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=keralaholi user-29=wwwresourcehunte user-30=wwwrmswll feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 12:22:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 12:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Sz2orjkLItwTzuRW.~ Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Sz2orjkLItwTzuRW.~' Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Sz2orjkLItwTzuRW.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 12:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 12:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 12:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 12:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 12:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 12:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 12:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 12:25:53 host sshd[3909]: Invalid user cy from 194.110.203.109 port 58106 Jan 12 12:25:53 host sshd[3909]: input_userauth_request: invalid user cy [preauth] Jan 12 12:25:53 host sshd[3909]: pam_unix(sshd:auth): check pass; user unknown Jan 12 12:25:53 host sshd[3909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 12:25:55 host sshd[3909]: Failed password for invalid user cy from 194.110.203.109 port 58106 ssh2 Jan 12 12:25:59 host sshd[3909]: pam_unix(sshd:auth): check pass; user unknown Jan 12 12:26:00 host sshd[3909]: Failed password for invalid user cy from 194.110.203.109 port 58106 ssh2 Jan 12 12:26:04 host sshd[3909]: pam_unix(sshd:auth): check pass; user unknown Jan 12 12:26:06 host sshd[3909]: Failed password for invalid user cy from 194.110.203.109 port 58106 ssh2 Jan 12 12:26:09 host sshd[3909]: Connection closed by 194.110.203.109 port 58106 [preauth] Jan 12 12:26:09 host sshd[3909]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 12:32:20 host sshd[4767]: Did not receive identification string from 144.126.208.202 port 59916 Jan 12 12:33:23 host sshd[4897]: Invalid user code87 from 144.126.208.202 port 56620 Jan 12 12:33:23 host sshd[4897]: input_userauth_request: invalid user code87 [preauth] Jan 12 12:33:23 host sshd[4897]: pam_unix(sshd:auth): check pass; user unknown Jan 12 12:33:23 host sshd[4897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.126.208.202 Jan 12 12:33:25 host sshd[4897]: Failed password for invalid user code87 from 144.126.208.202 port 56620 ssh2 Jan 12 12:33:25 host sshd[4897]: Received disconnect from 144.126.208.202 port 56620:11: Normal Shutdown, Thank you for playing [preauth] Jan 12 12:33:25 host sshd[4897]: Disconnected from 144.126.208.202 port 56620 [preauth] Jan 12 12:34:38 host sshd[5109]: Invalid user merten from 144.126.208.202 port 48678 Jan 12 12:34:38 host sshd[5109]: input_userauth_request: invalid user merten [preauth] Jan 12 12:34:38 host sshd[5109]: pam_unix(sshd:auth): check pass; user unknown Jan 12 12:34:38 host sshd[5109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.126.208.202 Jan 12 12:34:40 host sshd[5109]: Failed password for invalid user merten from 144.126.208.202 port 48678 ssh2 Jan 12 12:34:41 host sshd[5109]: Received disconnect from 144.126.208.202 port 48678:11: Normal Shutdown, Thank you for playing [preauth] Jan 12 12:34:41 host sshd[5109]: Disconnected from 144.126.208.202 port 48678 [preauth] Jan 12 12:39:16 host sshd[5905]: Invalid user hikvision from 221.155.133.202 port 49752 Jan 12 12:39:16 host sshd[5905]: input_userauth_request: invalid user hikvision [preauth] Jan 12 12:39:16 host sshd[5905]: pam_unix(sshd:auth): check pass; user unknown Jan 12 12:39:16 host sshd[5905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.155.133.202 Jan 12 12:39:19 host sshd[5905]: Failed password for invalid user hikvision from 221.155.133.202 port 49752 ssh2 Jan 12 12:39:20 host sshd[5905]: pam_unix(sshd:auth): check pass; user unknown Jan 12 12:39:22 host sshd[5905]: Failed password for invalid user hikvision from 221.155.133.202 port 49752 ssh2 Jan 12 12:39:22 host sshd[5905]: Failed password for invalid user hikvision from 221.155.133.202 port 49752 ssh2 Jan 12 12:39:23 host sshd[5905]: Connection closed by 221.155.133.202 port 49752 [preauth] Jan 12 12:39:23 host sshd[5905]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.155.133.202 Jan 12 12:48:33 host sshd[7387]: User root from 210.123.253.188 not allowed because not listed in AllowUsers Jan 12 12:48:33 host sshd[7387]: input_userauth_request: invalid user root [preauth] Jan 12 12:48:33 host unix_chkpwd[7389]: password check failed for user (root) Jan 12 12:48:33 host sshd[7387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.123.253.188 user=root Jan 12 12:48:33 host sshd[7387]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 12:48:35 host sshd[7387]: Failed password for invalid user root from 210.123.253.188 port 41674 ssh2 Jan 12 12:48:36 host unix_chkpwd[7395]: password check failed for user (root) Jan 12 12:48:36 host sshd[7387]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 12:48:37 host sshd[7387]: Failed password for invalid user root from 210.123.253.188 port 41674 ssh2 Jan 12 12:48:38 host sshd[7387]: Connection reset by 210.123.253.188 port 41674 [preauth] Jan 12 12:48:38 host sshd[7387]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.123.253.188 user=root Jan 12 13:03:26 host sshd[9596]: User root from 61.79.238.117 not allowed because not listed in AllowUsers Jan 12 13:03:26 host sshd[9596]: input_userauth_request: invalid user root [preauth] Jan 12 13:03:26 host unix_chkpwd[9600]: password check failed for user (root) Jan 12 13:03:26 host sshd[9596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.79.238.117 user=root Jan 12 13:03:26 host sshd[9596]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 13:03:28 host sshd[9596]: Failed password for invalid user root from 61.79.238.117 port 63480 ssh2 Jan 12 13:03:28 host unix_chkpwd[9604]: password check failed for user (root) Jan 12 13:03:28 host sshd[9596]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 13:03:31 host sshd[9596]: Failed password for invalid user root from 61.79.238.117 port 63480 ssh2 Jan 12 13:03:32 host unix_chkpwd[9633]: password check failed for user (root) Jan 12 13:03:32 host sshd[9596]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 13:03:34 host sshd[9596]: Failed password for invalid user root from 61.79.238.117 port 63480 ssh2 Jan 12 13:03:35 host unix_chkpwd[9637]: password check failed for user (root) Jan 12 13:03:35 host sshd[9596]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 13:03:38 host sshd[9596]: Failed password for invalid user root from 61.79.238.117 port 63480 ssh2 Jan 12 13:05:31 host sshd[9917]: Invalid user todd from 107.189.30.59 port 46400 Jan 12 13:05:31 host sshd[9917]: input_userauth_request: invalid user todd [preauth] Jan 12 13:05:31 host sshd[9917]: pam_unix(sshd:auth): check pass; user unknown Jan 12 13:05:31 host sshd[9917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 12 13:05:33 host sshd[9917]: Failed password for invalid user todd from 107.189.30.59 port 46400 ssh2 Jan 12 13:05:34 host sshd[9917]: Connection closed by 107.189.30.59 port 46400 [preauth] Jan 12 13:08:18 host sshd[10240]: Invalid user pi from 31.41.244.124 port 14370 Jan 12 13:08:18 host sshd[10240]: input_userauth_request: invalid user pi [preauth] Jan 12 13:08:18 host sshd[10240]: pam_unix(sshd:auth): check pass; user unknown Jan 12 13:08:18 host sshd[10240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 12 13:08:20 host sshd[10240]: Failed password for invalid user pi from 31.41.244.124 port 14370 ssh2 Jan 12 13:08:20 host sshd[10240]: Received disconnect from 31.41.244.124 port 14370:11: Client disconnecting normally [preauth] Jan 12 13:08:20 host sshd[10240]: Disconnected from 31.41.244.124 port 14370 [preauth] Jan 12 13:08:21 host sshd[10269]: User root from 31.41.244.124 not allowed because not listed in AllowUsers Jan 12 13:08:21 host sshd[10269]: input_userauth_request: invalid user root [preauth] Jan 12 13:08:21 host unix_chkpwd[10317]: password check failed for user (root) Jan 12 13:08:21 host sshd[10269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 user=root Jan 12 13:08:21 host sshd[10269]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 13:08:22 host sshd[10259]: Invalid user admin from 47.221.8.203 port 47590 Jan 12 13:08:22 host sshd[10259]: input_userauth_request: invalid user admin [preauth] Jan 12 13:08:22 host sshd[10259]: pam_unix(sshd:auth): check pass; user unknown Jan 12 13:08:22 host sshd[10259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.221.8.203 Jan 12 13:08:23 host sshd[10259]: Failed password for invalid user admin from 47.221.8.203 port 47590 ssh2 Jan 12 13:08:23 host sshd[10269]: Failed password for invalid user root from 31.41.244.124 port 17795 ssh2 Jan 12 13:08:23 host sshd[10269]: Received disconnect from 31.41.244.124 port 17795:11: Client disconnecting normally [preauth] Jan 12 13:08:23 host sshd[10269]: Disconnected from 31.41.244.124 port 17795 [preauth] Jan 12 13:08:24 host sshd[10259]: Failed password for invalid user admin from 47.221.8.203 port 47590 ssh2 Jan 12 13:08:24 host sshd[10351]: Invalid user username from 31.41.244.124 port 22066 Jan 12 13:08:24 host sshd[10351]: input_userauth_request: invalid user username [preauth] Jan 12 13:08:25 host sshd[10259]: pam_unix(sshd:auth): check pass; user unknown Jan 12 13:08:25 host sshd[10351]: pam_unix(sshd:auth): check pass; user unknown Jan 12 13:08:25 host sshd[10351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 12 13:08:27 host sshd[10259]: Failed password for invalid user admin from 47.221.8.203 port 47590 ssh2 Jan 12 13:08:27 host sshd[10351]: Failed password for invalid user username from 31.41.244.124 port 22066 ssh2 Jan 12 13:08:27 host sshd[10351]: Received disconnect from 31.41.244.124 port 22066:11: Client disconnecting normally [preauth] Jan 12 13:08:27 host sshd[10351]: Disconnected from 31.41.244.124 port 22066 [preauth] Jan 12 13:08:27 host sshd[10259]: pam_unix(sshd:auth): check pass; user unknown Jan 12 13:08:30 host sshd[10259]: Failed password for invalid user admin from 47.221.8.203 port 47590 ssh2 Jan 12 13:08:31 host sshd[10259]: pam_unix(sshd:auth): check pass; user unknown Jan 12 13:08:33 host sshd[10259]: Failed password for invalid user admin from 47.221.8.203 port 47590 ssh2 Jan 12 13:13:19 host sshd[10991]: Connection closed by 167.94.138.47 port 34452 [preauth] Jan 12 13:21:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=mrsclean user-6=wwwnexidigital user-7=phmetals user-8=kottayamcalldriv user-9=palco123 user-10=gifterman user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 13:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PTZU72xujwRJlspu.~ Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PTZU72xujwRJlspu.~' Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PTZU72xujwRJlspu.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 13:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 13:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 13:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 13:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 13:55:02 host sshd[17425]: Invalid user from 64.62.197.174 port 61947 Jan 12 13:55:02 host sshd[17425]: input_userauth_request: invalid user [preauth] Jan 12 13:55:05 host sshd[17425]: Connection closed by 64.62.197.174 port 61947 [preauth] Jan 12 14:05:56 host sshd[18998]: Did not receive identification string from 85.31.46.253 port 45062 Jan 12 14:06:29 host sshd[19045]: Invalid user admin from 59.2.28.171 port 63721 Jan 12 14:06:29 host sshd[19045]: input_userauth_request: invalid user admin [preauth] Jan 12 14:06:29 host sshd[19045]: pam_unix(sshd:auth): check pass; user unknown Jan 12 14:06:29 host sshd[19045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.2.28.171 Jan 12 14:06:32 host sshd[19045]: Failed password for invalid user admin from 59.2.28.171 port 63721 ssh2 Jan 12 14:06:33 host sshd[19045]: Failed password for invalid user admin from 59.2.28.171 port 63721 ssh2 Jan 12 14:06:34 host sshd[19045]: Connection reset by 59.2.28.171 port 63721 [preauth] Jan 12 14:07:20 host sshd[19139]: Did not receive identification string from 85.31.46.253 port 50656 Jan 12 14:08:44 host sshd[19297]: Did not receive identification string from 85.31.46.253 port 57650 Jan 12 14:10:07 host sshd[19565]: Did not receive identification string from 85.31.46.253 port 37192 Jan 12 14:13:46 host sshd[19984]: User root from 24.142.8.183 not allowed because not listed in AllowUsers Jan 12 14:13:46 host sshd[19984]: input_userauth_request: invalid user root [preauth] Jan 12 14:13:46 host unix_chkpwd[19994]: password check failed for user (root) Jan 12 14:13:46 host sshd[19984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.142.8.183 user=root Jan 12 14:13:46 host sshd[19984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:13:49 host sshd[19984]: Failed password for invalid user root from 24.142.8.183 port 48072 ssh2 Jan 12 14:13:49 host unix_chkpwd[20001]: password check failed for user (root) Jan 12 14:13:49 host sshd[19984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:13:51 host sshd[19984]: Failed password for invalid user root from 24.142.8.183 port 48072 ssh2 Jan 12 14:13:51 host unix_chkpwd[20005]: password check failed for user (root) Jan 12 14:13:51 host sshd[19984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:13:54 host sshd[19984]: Failed password for invalid user root from 24.142.8.183 port 48072 ssh2 Jan 12 14:13:54 host unix_chkpwd[20016]: password check failed for user (root) Jan 12 14:13:54 host sshd[19984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:13:56 host sshd[19984]: Failed password for invalid user root from 24.142.8.183 port 48072 ssh2 Jan 12 14:13:57 host unix_chkpwd[20022]: password check failed for user (root) Jan 12 14:13:57 host sshd[19984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:13:59 host sshd[19984]: Failed password for invalid user root from 24.142.8.183 port 48072 ssh2 Jan 12 14:13:59 host unix_chkpwd[20030]: password check failed for user (root) Jan 12 14:13:59 host sshd[19984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:14:01 host sshd[19984]: Failed password for invalid user root from 24.142.8.183 port 48072 ssh2 Jan 12 14:14:01 host sshd[19984]: error: maximum authentication attempts exceeded for invalid user root from 24.142.8.183 port 48072 ssh2 [preauth] Jan 12 14:14:01 host sshd[19984]: Disconnecting: Too many authentication failures [preauth] Jan 12 14:14:01 host sshd[19984]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.142.8.183 user=root Jan 12 14:14:01 host sshd[19984]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 12 14:18:52 host sshd[20712]: Invalid user cz from 194.110.203.109 port 48504 Jan 12 14:18:52 host sshd[20712]: input_userauth_request: invalid user cz [preauth] Jan 12 14:18:52 host sshd[20712]: pam_unix(sshd:auth): check pass; user unknown Jan 12 14:18:52 host sshd[20712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 14:18:54 host sshd[20712]: Failed password for invalid user cz from 194.110.203.109 port 48504 ssh2 Jan 12 14:18:57 host sshd[20712]: pam_unix(sshd:auth): check pass; user unknown Jan 12 14:19:00 host sshd[20712]: Failed password for invalid user cz from 194.110.203.109 port 48504 ssh2 Jan 12 14:19:03 host sshd[20712]: pam_unix(sshd:auth): check pass; user unknown Jan 12 14:19:05 host sshd[20712]: Failed password for invalid user cz from 194.110.203.109 port 48504 ssh2 Jan 12 14:19:08 host sshd[20712]: Connection closed by 194.110.203.109 port 48504 [preauth] Jan 12 14:19:08 host sshd[20712]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=kottayamcalldriv user-4=phmetals user-5=palco123 user-6=gifterman user-7=straightcurve user-8=wwwletsstalkfood user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=wwwkapin user-16=woodpeck user-17=wwwkmaorg user-18=disposeat user-19=remysagr user-20=ugotscom user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 14:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oCGLVOhDZqNWz90s.~ Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oCGLVOhDZqNWz90s.~' Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-oCGLVOhDZqNWz90s.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 14:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 14:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 14:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 14:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 14:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 14:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 14:35:54 host sshd[23339]: User vfmassets from 141.98.11.150 not allowed because not listed in AllowUsers Jan 12 14:35:54 host sshd[23339]: input_userauth_request: invalid user vfmassets [preauth] Jan 12 14:35:54 host unix_chkpwd[23342]: password check failed for user (vfmassets) Jan 12 14:35:54 host sshd[23339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.150 user=vfmassets Jan 12 14:35:56 host sshd[23339]: Failed password for invalid user vfmassets from 141.98.11.150 port 36496 ssh2 Jan 12 14:35:56 host sshd[23339]: Received disconnect from 141.98.11.150 port 36496:11: Normal Shutdown, Thank you for playing [preauth] Jan 12 14:35:56 host sshd[23339]: Disconnected from 141.98.11.150 port 36496 [preauth] Jan 12 14:39:01 host sshd[23844]: Did not receive identification string from 58.72.18.130 port 56502 Jan 12 14:42:07 host sshd[24421]: User vfmassets from 141.98.11.150 not allowed because not listed in AllowUsers Jan 12 14:42:07 host sshd[24421]: input_userauth_request: invalid user vfmassets [preauth] Jan 12 14:42:07 host unix_chkpwd[24424]: password check failed for user (vfmassets) Jan 12 14:42:07 host sshd[24421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.150 user=vfmassets Jan 12 14:42:09 host sshd[24421]: Failed password for invalid user vfmassets from 141.98.11.150 port 51772 ssh2 Jan 12 14:42:09 host sshd[24421]: Received disconnect from 141.98.11.150 port 51772:11: Normal Shutdown, Thank you for playing [preauth] Jan 12 14:42:09 host sshd[24421]: Disconnected from 141.98.11.150 port 51772 [preauth] Jan 12 14:44:02 host sshd[24671]: User root from 190.70.169.166 not allowed because not listed in AllowUsers Jan 12 14:44:02 host sshd[24671]: input_userauth_request: invalid user root [preauth] Jan 12 14:44:02 host unix_chkpwd[24684]: password check failed for user (root) Jan 12 14:44:02 host sshd[24671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.70.169.166 user=root Jan 12 14:44:02 host sshd[24671]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:44:05 host sshd[24671]: Failed password for invalid user root from 190.70.169.166 port 42158 ssh2 Jan 12 14:44:05 host sshd[24671]: Received disconnect from 190.70.169.166 port 42158:11: Bye Bye [preauth] Jan 12 14:44:05 host sshd[24671]: Disconnected from 190.70.169.166 port 42158 [preauth] Jan 12 14:46:25 host sshd[25105]: User root from 128.14.230.155 not allowed because not listed in AllowUsers Jan 12 14:46:25 host sshd[25105]: input_userauth_request: invalid user root [preauth] Jan 12 14:46:25 host unix_chkpwd[25108]: password check failed for user (root) Jan 12 14:46:25 host sshd[25105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.230.155 user=root Jan 12 14:46:25 host sshd[25105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:46:28 host sshd[25105]: Failed password for invalid user root from 128.14.230.155 port 35022 ssh2 Jan 12 14:46:28 host sshd[25105]: Received disconnect from 128.14.230.155 port 35022:11: Bye Bye [preauth] Jan 12 14:46:28 host sshd[25105]: Disconnected from 128.14.230.155 port 35022 [preauth] Jan 12 14:46:59 host sshd[25186]: User root from 43.156.41.4 not allowed because not listed in AllowUsers Jan 12 14:46:59 host sshd[25186]: input_userauth_request: invalid user root [preauth] Jan 12 14:46:59 host unix_chkpwd[25189]: password check failed for user (root) Jan 12 14:46:59 host sshd[25186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.41.4 user=root Jan 12 14:46:59 host sshd[25186]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:47:02 host sshd[25186]: Failed password for invalid user root from 43.156.41.4 port 51494 ssh2 Jan 12 14:47:02 host sshd[25186]: Received disconnect from 43.156.41.4 port 51494:11: Bye Bye [preauth] Jan 12 14:47:02 host sshd[25186]: Disconnected from 43.156.41.4 port 51494 [preauth] Jan 12 14:49:05 host sshd[25478]: User root from 139.255.116.74 not allowed because not listed in AllowUsers Jan 12 14:49:05 host sshd[25478]: input_userauth_request: invalid user root [preauth] Jan 12 14:49:05 host unix_chkpwd[25481]: password check failed for user (root) Jan 12 14:49:05 host sshd[25478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.116.74 user=root Jan 12 14:49:05 host sshd[25478]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:49:07 host sshd[25478]: Failed password for invalid user root from 139.255.116.74 port 44438 ssh2 Jan 12 14:49:07 host sshd[25478]: Received disconnect from 139.255.116.74 port 44438:11: Bye Bye [preauth] Jan 12 14:49:07 host sshd[25478]: Disconnected from 139.255.116.74 port 44438 [preauth] Jan 12 14:49:36 host sshd[25552]: User root from 128.14.230.155 not allowed because not listed in AllowUsers Jan 12 14:49:36 host sshd[25552]: input_userauth_request: invalid user root [preauth] Jan 12 14:49:36 host unix_chkpwd[25555]: password check failed for user (root) Jan 12 14:49:36 host sshd[25552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.230.155 user=root Jan 12 14:49:36 host sshd[25552]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:49:38 host sshd[25552]: Failed password for invalid user root from 128.14.230.155 port 37014 ssh2 Jan 12 14:49:38 host sshd[25552]: Received disconnect from 128.14.230.155 port 37014:11: Bye Bye [preauth] Jan 12 14:49:38 host sshd[25552]: Disconnected from 128.14.230.155 port 37014 [preauth] Jan 12 14:49:57 host sshd[25612]: User root from 190.70.169.166 not allowed because not listed in AllowUsers Jan 12 14:49:57 host sshd[25612]: input_userauth_request: invalid user root [preauth] Jan 12 14:49:57 host unix_chkpwd[25621]: password check failed for user (root) Jan 12 14:49:57 host sshd[25612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.70.169.166 user=root Jan 12 14:49:57 host sshd[25612]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:49:59 host sshd[25612]: Failed password for invalid user root from 190.70.169.166 port 41526 ssh2 Jan 12 14:49:59 host sshd[25612]: Received disconnect from 190.70.169.166 port 41526:11: Bye Bye [preauth] Jan 12 14:49:59 host sshd[25612]: Disconnected from 190.70.169.166 port 41526 [preauth] Jan 12 14:50:43 host sshd[25785]: User root from 43.156.41.4 not allowed because not listed in AllowUsers Jan 12 14:50:43 host sshd[25785]: input_userauth_request: invalid user root [preauth] Jan 12 14:50:43 host unix_chkpwd[25787]: password check failed for user (root) Jan 12 14:50:43 host sshd[25785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.41.4 user=root Jan 12 14:50:43 host sshd[25785]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:50:45 host sshd[25785]: Failed password for invalid user root from 43.156.41.4 port 34172 ssh2 Jan 12 14:50:45 host sshd[25785]: Received disconnect from 43.156.41.4 port 34172:11: Bye Bye [preauth] Jan 12 14:50:45 host sshd[25785]: Disconnected from 43.156.41.4 port 34172 [preauth] Jan 12 14:51:11 host sshd[25967]: User root from 139.255.116.74 not allowed because not listed in AllowUsers Jan 12 14:51:11 host sshd[25967]: input_userauth_request: invalid user root [preauth] Jan 12 14:51:11 host unix_chkpwd[25969]: password check failed for user (root) Jan 12 14:51:11 host sshd[25967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.116.74 user=root Jan 12 14:51:11 host sshd[25967]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 14:51:13 host sshd[25967]: Failed password for invalid user root from 139.255.116.74 port 45686 ssh2 Jan 12 14:51:13 host sshd[25967]: Received disconnect from 139.255.116.74 port 45686:11: Bye Bye [preauth] Jan 12 14:51:13 host sshd[25967]: Disconnected from 139.255.116.74 port 45686 [preauth] Jan 12 14:55:49 host sshd[26515]: Invalid user hikvision from 88.249.80.139 port 59889 Jan 12 14:55:49 host sshd[26515]: input_userauth_request: invalid user hikvision [preauth] Jan 12 14:55:49 host sshd[26515]: pam_unix(sshd:auth): check pass; user unknown Jan 12 14:55:49 host sshd[26515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.249.80.139 Jan 12 14:55:51 host sshd[26515]: Failed password for invalid user hikvision from 88.249.80.139 port 59889 ssh2 Jan 12 14:55:53 host sshd[26515]: pam_unix(sshd:auth): check pass; user unknown Jan 12 14:55:55 host sshd[26515]: Failed password for invalid user hikvision from 88.249.80.139 port 59889 ssh2 Jan 12 14:55:56 host sshd[26515]: Failed password for invalid user hikvision from 88.249.80.139 port 59889 ssh2 Jan 12 14:55:57 host sshd[26515]: Connection closed by 88.249.80.139 port 59889 [preauth] Jan 12 14:55:57 host sshd[26515]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.249.80.139 Jan 12 14:59:41 host sshd[27073]: Invalid user support from 14.42.101.70 port 32842 Jan 12 14:59:41 host sshd[27073]: input_userauth_request: invalid user support [preauth] Jan 12 14:59:41 host sshd[27073]: pam_unix(sshd:auth): check pass; user unknown Jan 12 14:59:41 host sshd[27073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.42.101.70 Jan 12 14:59:43 host sshd[27073]: Failed password for invalid user support from 14.42.101.70 port 32842 ssh2 Jan 12 14:59:45 host sshd[27073]: Connection reset by 14.42.101.70 port 32842 [preauth] Jan 12 15:10:56 host sshd[28715]: Did not receive identification string from 163.53.90.10 port 36519 Jan 12 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=wwwresourcehunte user-4=keralaholi user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=phmetals user-15=kottayamcalldriv user-16=gifterman user-17=palco123 user-18=straightcurve user-19=wwwletsstalkfood user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=wwwkapin user-27=woodpeck user-28=wwwkmaorg user-29=disposeat user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 15:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-e8WPnjhiEJMR0jzt.~ Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-e8WPnjhiEJMR0jzt.~' Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-e8WPnjhiEJMR0jzt.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 15:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 15:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 15:27:04 host sshd[31448]: Did not receive identification string from 149.129.220.222 port 61000 Jan 12 15:37:12 host sshd[472]: Invalid user admin from 210.126.26.33 port 56293 Jan 12 15:37:12 host sshd[472]: input_userauth_request: invalid user admin [preauth] Jan 12 15:37:12 host sshd[472]: pam_unix(sshd:auth): check pass; user unknown Jan 12 15:37:12 host sshd[472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.126.26.33 Jan 12 15:37:15 host sshd[472]: Failed password for invalid user admin from 210.126.26.33 port 56293 ssh2 Jan 12 15:37:15 host sshd[472]: Connection closed by 210.126.26.33 port 56293 [preauth] Jan 12 15:38:19 host sshd[620]: User root from 211.106.150.46 not allowed because not listed in AllowUsers Jan 12 15:38:19 host sshd[620]: input_userauth_request: invalid user root [preauth] Jan 12 15:38:19 host unix_chkpwd[627]: password check failed for user (root) Jan 12 15:38:19 host sshd[620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.106.150.46 user=root Jan 12 15:38:19 host sshd[620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:38:21 host sshd[620]: Failed password for invalid user root from 211.106.150.46 port 59012 ssh2 Jan 12 15:38:22 host unix_chkpwd[637]: password check failed for user (root) Jan 12 15:38:22 host sshd[620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:38:24 host sshd[620]: Failed password for invalid user root from 211.106.150.46 port 59012 ssh2 Jan 12 15:38:25 host unix_chkpwd[648]: password check failed for user (root) Jan 12 15:38:25 host sshd[620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:38:26 host sshd[620]: Failed password for invalid user root from 211.106.150.46 port 59012 ssh2 Jan 12 15:38:26 host sshd[620]: Connection reset by 211.106.150.46 port 59012 [preauth] Jan 12 15:38:26 host sshd[620]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.106.150.46 user=root Jan 12 15:39:25 host sshd[861]: User root from 14.186.37.27 not allowed because not listed in AllowUsers Jan 12 15:39:25 host sshd[861]: input_userauth_request: invalid user root [preauth] Jan 12 15:39:25 host unix_chkpwd[910]: password check failed for user (root) Jan 12 15:39:25 host sshd[861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.186.37.27 user=root Jan 12 15:39:25 host sshd[861]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:39:26 host sshd[861]: Failed password for invalid user root from 14.186.37.27 port 37031 ssh2 Jan 12 15:39:26 host unix_chkpwd[917]: password check failed for user (root) Jan 12 15:39:26 host sshd[861]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:39:27 host sshd[861]: Failed password for invalid user root from 14.186.37.27 port 37031 ssh2 Jan 12 15:39:28 host unix_chkpwd[919]: password check failed for user (root) Jan 12 15:39:28 host sshd[861]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:39:30 host sshd[861]: Failed password for invalid user root from 14.186.37.27 port 37031 ssh2 Jan 12 15:39:30 host sshd[861]: Connection reset by 14.186.37.27 port 37031 [preauth] Jan 12 15:39:30 host sshd[861]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.186.37.27 user=root Jan 12 15:40:19 host sshd[1069]: User root from 61.146.48.118 not allowed because not listed in AllowUsers Jan 12 15:40:19 host sshd[1069]: input_userauth_request: invalid user root [preauth] Jan 12 15:40:20 host unix_chkpwd[1082]: password check failed for user (root) Jan 12 15:40:20 host sshd[1069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.146.48.118 user=root Jan 12 15:40:20 host sshd[1069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:40:21 host sshd[1069]: Failed password for invalid user root from 61.146.48.118 port 58785 ssh2 Jan 12 15:40:22 host unix_chkpwd[1086]: password check failed for user (root) Jan 12 15:40:22 host sshd[1069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:40:24 host sshd[1069]: Failed password for invalid user root from 61.146.48.118 port 58785 ssh2 Jan 12 15:40:24 host unix_chkpwd[1091]: password check failed for user (root) Jan 12 15:40:24 host sshd[1069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:40:27 host sshd[1069]: Failed password for invalid user root from 61.146.48.118 port 58785 ssh2 Jan 12 15:40:27 host unix_chkpwd[1099]: password check failed for user (root) Jan 12 15:40:27 host sshd[1069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:40:29 host sshd[1069]: Failed password for invalid user root from 61.146.48.118 port 58785 ssh2 Jan 12 15:44:28 host sshd[1597]: Received disconnect from 49.88.112.60 port 56736:11: [preauth] Jan 12 15:44:28 host sshd[1597]: Disconnected from 49.88.112.60 port 56736 [preauth] Jan 12 15:46:47 host sshd[1751]: Connection reset by 49.88.112.60 port 27402 [preauth] Jan 12 15:46:53 host sshd[2026]: User root from 211.114.79.132 not allowed because not listed in AllowUsers Jan 12 15:46:53 host sshd[2026]: input_userauth_request: invalid user root [preauth] Jan 12 15:46:53 host unix_chkpwd[2044]: password check failed for user (root) Jan 12 15:46:53 host sshd[2026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.114.79.132 user=root Jan 12 15:46:53 host sshd[2026]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:46:55 host sshd[2026]: Failed password for invalid user root from 211.114.79.132 port 62858 ssh2 Jan 12 15:46:56 host unix_chkpwd[2047]: password check failed for user (root) Jan 12 15:46:56 host sshd[2026]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:46:57 host sshd[2026]: Failed password for invalid user root from 211.114.79.132 port 62858 ssh2 Jan 12 15:46:58 host unix_chkpwd[2050]: password check failed for user (root) Jan 12 15:46:58 host sshd[2026]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:47:00 host sshd[2026]: Failed password for invalid user root from 211.114.79.132 port 62858 ssh2 Jan 12 15:47:01 host unix_chkpwd[2054]: password check failed for user (root) Jan 12 15:47:01 host sshd[2026]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:47:04 host sshd[2026]: Failed password for invalid user root from 211.114.79.132 port 62858 ssh2 Jan 12 15:47:50 host sshd[2187]: User root from 49.88.112.60 not allowed because not listed in AllowUsers Jan 12 15:47:50 host sshd[2187]: input_userauth_request: invalid user root [preauth] Jan 12 15:47:51 host unix_chkpwd[2192]: password check failed for user (root) Jan 12 15:47:51 host sshd[2187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60 user=root Jan 12 15:47:51 host sshd[2187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:47:53 host sshd[2187]: Failed password for invalid user root from 49.88.112.60 port 41991 ssh2 Jan 12 15:47:53 host unix_chkpwd[2195]: password check failed for user (root) Jan 12 15:47:53 host sshd[2187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:47:54 host sshd[2187]: Failed password for invalid user root from 49.88.112.60 port 41991 ssh2 Jan 12 15:47:55 host unix_chkpwd[2198]: password check failed for user (root) Jan 12 15:47:55 host sshd[2187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 15:47:57 host sshd[2187]: Failed password for invalid user root from 49.88.112.60 port 41991 ssh2 Jan 12 15:47:58 host sshd[2187]: Received disconnect from 49.88.112.60 port 41991:11: [preauth] Jan 12 15:47:58 host sshd[2187]: Disconnected from 49.88.112.60 port 41991 [preauth] Jan 12 15:47:58 host sshd[2187]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60 user=root Jan 12 16:01:57 host sshd[4471]: Invalid user admin from 114.33.80.198 port 51766 Jan 12 16:01:57 host sshd[4471]: input_userauth_request: invalid user admin [preauth] Jan 12 16:01:57 host sshd[4471]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:01:57 host sshd[4471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.80.198 Jan 12 16:01:59 host sshd[4471]: Failed password for invalid user admin from 114.33.80.198 port 51766 ssh2 Jan 12 16:02:00 host sshd[4471]: Failed password for invalid user admin from 114.33.80.198 port 51766 ssh2 Jan 12 16:02:01 host sshd[4471]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:02:04 host sshd[4471]: Failed password for invalid user admin from 114.33.80.198 port 51766 ssh2 Jan 12 16:02:05 host sshd[4471]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:02:07 host sshd[4471]: Failed password for invalid user admin from 114.33.80.198 port 51766 ssh2 Jan 12 16:02:08 host sshd[4471]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:02:10 host sshd[4471]: Failed password for invalid user admin from 114.33.80.198 port 51766 ssh2 Jan 12 16:06:18 host sshd[5169]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 12 16:06:18 host sshd[5169]: input_userauth_request: invalid user root [preauth] Jan 12 16:06:18 host unix_chkpwd[5180]: password check failed for user (root) Jan 12 16:06:18 host sshd[5169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 12 16:06:18 host sshd[5169]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 16:06:20 host sshd[5169]: Failed password for invalid user root from 194.169.175.102 port 56948 ssh2 Jan 12 16:06:20 host sshd[5169]: Received disconnect from 194.169.175.102 port 56948:11: Client disconnecting normally [preauth] Jan 12 16:06:20 host sshd[5169]: Disconnected from 194.169.175.102 port 56948 [preauth] Jan 12 16:10:23 host sshd[5803]: Invalid user d from 194.110.203.109 port 41266 Jan 12 16:10:23 host sshd[5803]: input_userauth_request: invalid user d [preauth] Jan 12 16:10:23 host sshd[5803]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:10:23 host sshd[5803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 16:10:25 host sshd[5803]: Failed password for invalid user d from 194.110.203.109 port 41266 ssh2 Jan 12 16:10:28 host sshd[5803]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:10:30 host sshd[5803]: Failed password for invalid user d from 194.110.203.109 port 41266 ssh2 Jan 12 16:10:34 host sshd[5803]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:10:35 host sshd[5803]: Failed password for invalid user d from 194.110.203.109 port 41266 ssh2 Jan 12 16:10:38 host sshd[5803]: Connection closed by 194.110.203.109 port 41266 [preauth] Jan 12 16:10:38 host sshd[5803]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=wwwletsstalkfood user-13=straightcurve user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=wwwnexidigital user-19=mrsclean user-20=wwwkaretakers user-21=cochintaxi user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=keralaholi user-29=wwwresourcehunte user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 16:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XMYzhpDvOeI5wBq6.~ Jan 12 16:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XMYzhpDvOeI5wBq6.~' Jan 12 16:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XMYzhpDvOeI5wBq6.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 16:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 16:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 16:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 16:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 16:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 16:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 16:39:20 host sshd[10834]: Invalid user zyfwp from 121.190.54.53 port 54472 Jan 12 16:39:20 host sshd[10834]: input_userauth_request: invalid user zyfwp [preauth] Jan 12 16:39:20 host sshd[10834]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:39:20 host sshd[10834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.190.54.53 Jan 12 16:39:21 host sshd[10834]: Failed password for invalid user zyfwp from 121.190.54.53 port 54472 ssh2 Jan 12 16:39:22 host sshd[10834]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:39:25 host sshd[10834]: Failed password for invalid user zyfwp from 121.190.54.53 port 54472 ssh2 Jan 12 16:39:26 host sshd[10834]: Connection reset by 121.190.54.53 port 54472 [preauth] Jan 12 16:39:26 host sshd[10834]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.190.54.53 Jan 12 16:51:12 host sshd[12477]: User root from 201.108.234.41 not allowed because not listed in AllowUsers Jan 12 16:51:12 host sshd[12477]: input_userauth_request: invalid user root [preauth] Jan 12 16:51:13 host unix_chkpwd[12486]: password check failed for user (root) Jan 12 16:51:13 host sshd[12477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.108.234.41 user=root Jan 12 16:51:13 host sshd[12477]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 16:51:14 host sshd[12477]: Failed password for invalid user root from 201.108.234.41 port 42017 ssh2 Jan 12 16:51:15 host unix_chkpwd[12490]: password check failed for user (root) Jan 12 16:51:15 host sshd[12477]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 16:51:17 host sshd[12477]: Failed password for invalid user root from 201.108.234.41 port 42017 ssh2 Jan 12 16:51:18 host unix_chkpwd[12494]: password check failed for user (root) Jan 12 16:51:18 host sshd[12477]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 16:51:20 host sshd[12477]: Failed password for invalid user root from 201.108.234.41 port 42017 ssh2 Jan 12 16:51:20 host unix_chkpwd[12497]: password check failed for user (root) Jan 12 16:51:20 host sshd[12477]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 16:51:22 host sshd[12477]: Failed password for invalid user root from 201.108.234.41 port 42017 ssh2 Jan 12 16:51:56 host sshd[12596]: Did not receive identification string from 85.31.46.253 port 45780 Jan 12 16:57:50 host sshd[13564]: Invalid user telnet from 87.241.168.49 port 59706 Jan 12 16:57:50 host sshd[13564]: input_userauth_request: invalid user telnet [preauth] Jan 12 16:57:50 host sshd[13564]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:57:50 host sshd[13564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.241.168.49 Jan 12 16:57:51 host sshd[13567]: Invalid user bigipuser3 from 87.241.168.49 port 59643 Jan 12 16:57:51 host sshd[13567]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 12 16:57:51 host sshd[13567]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:57:51 host sshd[13567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.241.168.49 Jan 12 16:57:51 host sshd[13564]: Failed password for invalid user telnet from 87.241.168.49 port 59706 ssh2 Jan 12 16:57:53 host sshd[13567]: Failed password for invalid user bigipuser3 from 87.241.168.49 port 59643 ssh2 Jan 12 16:57:53 host sshd[13564]: Connection reset by 87.241.168.49 port 59706 [preauth] Jan 12 16:57:53 host sshd[13567]: pam_unix(sshd:auth): check pass; user unknown Jan 12 16:57:55 host sshd[13567]: Failed password for invalid user bigipuser3 from 87.241.168.49 port 59643 ssh2 Jan 12 16:57:56 host sshd[13567]: Connection reset by 87.241.168.49 port 59643 [preauth] Jan 12 16:57:56 host sshd[13567]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.241.168.49 Jan 12 17:02:54 host sshd[14692]: Invalid user admin from 121.183.220.151 port 40353 Jan 12 17:02:54 host sshd[14692]: input_userauth_request: invalid user admin [preauth] Jan 12 17:02:54 host sshd[14692]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:02:54 host sshd[14692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.183.220.151 Jan 12 17:02:56 host sshd[14692]: Failed password for invalid user admin from 121.183.220.151 port 40353 ssh2 Jan 12 17:02:56 host sshd[14692]: Connection reset by 121.183.220.151 port 40353 [preauth] Jan 12 17:10:46 host sshd[16374]: Invalid user admin from 122.180.243.168 port 33306 Jan 12 17:10:46 host sshd[16374]: input_userauth_request: invalid user admin [preauth] Jan 12 17:10:46 host sshd[16374]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:10:46 host sshd[16374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.180.243.168 Jan 12 17:10:48 host sshd[16374]: Failed password for invalid user admin from 122.180.243.168 port 33306 ssh2 Jan 12 17:10:48 host sshd[16374]: Connection reset by 122.180.243.168 port 33306 [preauth] Jan 12 17:13:24 host sshd[16673]: User root from 118.38.80.138 not allowed because not listed in AllowUsers Jan 12 17:13:24 host sshd[16673]: input_userauth_request: invalid user root [preauth] Jan 12 17:13:24 host unix_chkpwd[16678]: password check failed for user (root) Jan 12 17:13:24 host sshd[16673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.38.80.138 user=root Jan 12 17:13:24 host sshd[16673]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 17:13:26 host sshd[16673]: Failed password for invalid user root from 118.38.80.138 port 49548 ssh2 Jan 12 17:13:28 host unix_chkpwd[16686]: password check failed for user (root) Jan 12 17:13:28 host sshd[16673]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 17:13:30 host sshd[16673]: Failed password for invalid user root from 118.38.80.138 port 49548 ssh2 Jan 12 17:13:31 host sshd[16673]: Connection reset by 118.38.80.138 port 49548 [preauth] Jan 12 17:13:31 host sshd[16673]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.38.80.138 user=root Jan 12 17:15:51 host sshd[17119]: Invalid user usr from 27.109.240.43 port 41345 Jan 12 17:15:51 host sshd[17119]: input_userauth_request: invalid user usr [preauth] Jan 12 17:15:51 host sshd[17119]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:15:51 host sshd[17119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.109.240.43 Jan 12 17:15:53 host sshd[17119]: Failed password for invalid user usr from 27.109.240.43 port 41345 ssh2 Jan 12 17:15:55 host sshd[17119]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:15:57 host sshd[17119]: Failed password for invalid user usr from 27.109.240.43 port 41345 ssh2 Jan 12 17:15:58 host sshd[17119]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:16:00 host sshd[17119]: Failed password for invalid user usr from 27.109.240.43 port 41345 ssh2 Jan 12 17:16:01 host sshd[17119]: Connection reset by 27.109.240.43 port 41345 [preauth] Jan 12 17:16:01 host sshd[17119]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.109.240.43 Jan 12 17:20:22 host sshd[17695]: Invalid user pi from 82.66.3.241 port 36524 Jan 12 17:20:22 host sshd[17695]: input_userauth_request: invalid user pi [preauth] Jan 12 17:20:22 host sshd[17697]: Invalid user pi from 82.66.3.241 port 36530 Jan 12 17:20:22 host sshd[17697]: input_userauth_request: invalid user pi [preauth] Jan 12 17:20:22 host sshd[17695]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:20:22 host sshd[17695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.66.3.241 Jan 12 17:20:22 host sshd[17697]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:20:22 host sshd[17697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.66.3.241 Jan 12 17:20:24 host sshd[17695]: Failed password for invalid user pi from 82.66.3.241 port 36524 ssh2 Jan 12 17:20:24 host sshd[17697]: Failed password for invalid user pi from 82.66.3.241 port 36530 ssh2 Jan 12 17:20:25 host sshd[17695]: Connection closed by 82.66.3.241 port 36524 [preauth] Jan 12 17:20:25 host sshd[17697]: Connection closed by 82.66.3.241 port 36530 [preauth] Jan 12 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=kottayamcalldriv user-4=phmetals user-5=palco123 user-6=gifterman user-7=straightcurve user-8=wwwletsstalkfood user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=wwwkapin user-16=woodpeck user-17=remysagr user-18=disposeat user-19=wwwkmaorg user-20=ugotscom user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 17:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4LED12Rg6REImSA5.~ Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4LED12Rg6REImSA5.~' Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4LED12Rg6REImSA5.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 17:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 17:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 17:25:23 host sshd[18695]: Did not receive identification string from 85.31.46.253 port 41570 Jan 12 17:25:43 host sshd[18757]: Invalid user pi from 59.11.231.230 port 63453 Jan 12 17:25:43 host sshd[18757]: input_userauth_request: invalid user pi [preauth] Jan 12 17:25:43 host sshd[18757]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:25:43 host sshd[18757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.11.231.230 Jan 12 17:25:45 host sshd[18757]: Failed password for invalid user pi from 59.11.231.230 port 63453 ssh2 Jan 12 17:25:45 host sshd[18757]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:25:48 host sshd[18757]: Failed password for invalid user pi from 59.11.231.230 port 63453 ssh2 Jan 12 17:25:49 host sshd[18757]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:25:51 host sshd[18757]: Failed password for invalid user pi from 59.11.231.230 port 63453 ssh2 Jan 12 17:25:52 host sshd[18757]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:25:54 host sshd[18757]: Failed password for invalid user pi from 59.11.231.230 port 63453 ssh2 Jan 12 17:25:55 host sshd[18757]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:25:57 host sshd[18757]: Failed password for invalid user pi from 59.11.231.230 port 63453 ssh2 Jan 12 17:58:16 host sshd[23226]: Invalid user default from 59.126.15.99 port 59983 Jan 12 17:58:16 host sshd[23226]: input_userauth_request: invalid user default [preauth] Jan 12 17:58:16 host sshd[23226]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:58:16 host sshd[23226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.15.99 Jan 12 17:58:18 host sshd[23226]: Failed password for invalid user default from 59.126.15.99 port 59983 ssh2 Jan 12 17:58:19 host sshd[23226]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:58:21 host sshd[23226]: Failed password for invalid user default from 59.126.15.99 port 59983 ssh2 Jan 12 17:58:22 host sshd[23226]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:58:25 host sshd[23226]: Failed password for invalid user default from 59.126.15.99 port 59983 ssh2 Jan 12 17:58:27 host sshd[23226]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:58:28 host sshd[23226]: Failed password for invalid user default from 59.126.15.99 port 59983 ssh2 Jan 12 17:58:30 host sshd[23226]: pam_unix(sshd:auth): check pass; user unknown Jan 12 17:58:32 host sshd[23226]: Failed password for invalid user default from 59.126.15.99 port 59983 ssh2 Jan 12 18:07:09 host sshd[24513]: Invalid user da from 194.110.203.109 port 47710 Jan 12 18:07:09 host sshd[24513]: input_userauth_request: invalid user da [preauth] Jan 12 18:07:09 host sshd[24513]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:07:09 host sshd[24513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 18:07:11 host sshd[24513]: Failed password for invalid user da from 194.110.203.109 port 47710 ssh2 Jan 12 18:07:14 host sshd[24513]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:07:15 host sshd[24513]: Failed password for invalid user da from 194.110.203.109 port 47710 ssh2 Jan 12 18:07:19 host sshd[24513]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:07:21 host sshd[24513]: Failed password for invalid user da from 194.110.203.109 port 47710 ssh2 Jan 12 18:07:24 host sshd[24513]: Connection closed by 194.110.203.109 port 47710 [preauth] Jan 12 18:07:24 host sshd[24513]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 18:08:20 host sshd[24634]: Connection closed by 192.155.90.220 port 52306 [preauth] Jan 12 18:08:21 host sshd[24638]: Connection closed by 192.155.90.220 port 52314 [preauth] Jan 12 18:08:22 host sshd[24641]: Connection closed by 192.155.90.220 port 25956 [preauth] Jan 12 18:08:55 host sshd[24699]: Invalid user admin from 138.68.176.196 port 57780 Jan 12 18:08:55 host sshd[24699]: input_userauth_request: invalid user admin [preauth] Jan 12 18:08:55 host sshd[24699]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:08:55 host sshd[24699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.176.196 Jan 12 18:08:57 host sshd[24699]: Failed password for invalid user admin from 138.68.176.196 port 57780 ssh2 Jan 12 18:08:57 host sshd[24699]: Connection closed by 138.68.176.196 port 57780 [preauth] Jan 12 18:12:18 host sshd[25204]: Did not receive identification string from 85.31.46.253 port 55508 Jan 12 18:14:50 host sshd[25484]: User root from 138.68.176.196 not allowed because not listed in AllowUsers Jan 12 18:14:50 host sshd[25484]: input_userauth_request: invalid user root [preauth] Jan 12 18:14:51 host sshd[25482]: User root from 138.68.176.196 not allowed because not listed in AllowUsers Jan 12 18:14:51 host sshd[25482]: input_userauth_request: invalid user root [preauth] Jan 12 18:14:51 host unix_chkpwd[25487]: password check failed for user (root) Jan 12 18:14:51 host sshd[25484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.176.196 user=root Jan 12 18:14:51 host sshd[25484]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:14:51 host unix_chkpwd[25488]: password check failed for user (root) Jan 12 18:14:51 host sshd[25482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.176.196 user=root Jan 12 18:14:51 host sshd[25482]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:14:53 host sshd[25484]: Failed password for invalid user root from 138.68.176.196 port 56308 ssh2 Jan 12 18:14:53 host sshd[25482]: Failed password for invalid user root from 138.68.176.196 port 56300 ssh2 Jan 12 18:14:53 host sshd[25484]: Connection closed by 138.68.176.196 port 56308 [preauth] Jan 12 18:14:53 host sshd[25482]: Connection closed by 138.68.176.196 port 56300 [preauth] Jan 12 18:15:51 host sshd[25785]: Invalid user jesse from 107.189.30.59 port 32860 Jan 12 18:15:51 host sshd[25785]: input_userauth_request: invalid user jesse [preauth] Jan 12 18:15:51 host sshd[25785]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:15:51 host sshd[25785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 12 18:15:53 host sshd[25791]: User root from 62.233.50.248 not allowed because not listed in AllowUsers Jan 12 18:15:53 host sshd[25791]: input_userauth_request: invalid user root [preauth] Jan 12 18:15:54 host unix_chkpwd[25794]: password check failed for user (root) Jan 12 18:15:54 host sshd[25791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 user=root Jan 12 18:15:54 host sshd[25791]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:15:54 host sshd[25785]: Failed password for invalid user jesse from 107.189.30.59 port 32860 ssh2 Jan 12 18:15:54 host sshd[25785]: Connection closed by 107.189.30.59 port 32860 [preauth] Jan 12 18:15:56 host sshd[25791]: Failed password for invalid user root from 62.233.50.248 port 58022 ssh2 Jan 12 18:15:57 host sshd[25791]: Received disconnect from 62.233.50.248 port 58022:11: Client disconnecting normally [preauth] Jan 12 18:15:57 host sshd[25791]: Disconnected from 62.233.50.248 port 58022 [preauth] Jan 12 18:15:58 host sshd[25798]: Invalid user guest from 62.233.50.248 port 2389 Jan 12 18:15:58 host sshd[25798]: input_userauth_request: invalid user guest [preauth] Jan 12 18:15:58 host sshd[25798]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:15:58 host sshd[25798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 12 18:16:00 host sshd[25798]: Failed password for invalid user guest from 62.233.50.248 port 2389 ssh2 Jan 12 18:16:00 host sshd[25798]: Received disconnect from 62.233.50.248 port 2389:11: Client disconnecting normally [preauth] Jan 12 18:16:00 host sshd[25798]: Disconnected from 62.233.50.248 port 2389 [preauth] Jan 12 18:16:01 host sshd[25810]: Invalid user hacluster from 62.233.50.248 port 5292 Jan 12 18:16:01 host sshd[25810]: input_userauth_request: invalid user hacluster [preauth] Jan 12 18:16:01 host sshd[25810]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:16:01 host sshd[25810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 12 18:16:03 host sshd[25810]: Failed password for invalid user hacluster from 62.233.50.248 port 5292 ssh2 Jan 12 18:16:03 host sshd[25810]: Received disconnect from 62.233.50.248 port 5292:11: Client disconnecting normally [preauth] Jan 12 18:16:03 host sshd[25810]: Disconnected from 62.233.50.248 port 5292 [preauth] Jan 12 18:20:56 host sshd[26526]: Invalid user pi from 95.246.137.65 port 50322 Jan 12 18:20:56 host sshd[26526]: input_userauth_request: invalid user pi [preauth] Jan 12 18:20:56 host sshd[26526]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:20:56 host sshd[26526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.246.137.65 Jan 12 18:20:58 host sshd[26526]: Failed password for invalid user pi from 95.246.137.65 port 50322 ssh2 Jan 12 18:20:59 host sshd[26526]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:21:01 host sshd[26526]: Failed password for invalid user pi from 95.246.137.65 port 50322 ssh2 Jan 12 18:21:03 host sshd[26526]: Connection reset by 95.246.137.65 port 50322 [preauth] Jan 12 18:21:03 host sshd[26526]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.246.137.65 Jan 12 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 18:22:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=wwwkapin user-20=woodpeck user-21=palco123 user-22=gifterman user-23=kottayamcalldriv user-24=phmetals user-25=mrsclean user-26=wwwnexidigital user-27=bonifacegroup user-28=wwwevmhonda user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 18:22:11 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AVr1puA8puYD206G.~ Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AVr1puA8puYD206G.~' Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-AVr1puA8puYD206G.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 18:22:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 18:22:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 18:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 18:22:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 18:22:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 18:22:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 18:22:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:22:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 18:22:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 18:22:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 18:23:16 host sshd[26981]: Did not receive identification string from 198.235.24.173 port 54740 Jan 12 18:32:11 host sshd[28126]: User root from 222.110.197.87 not allowed because not listed in AllowUsers Jan 12 18:32:11 host sshd[28126]: input_userauth_request: invalid user root [preauth] Jan 12 18:32:12 host unix_chkpwd[28129]: password check failed for user (root) Jan 12 18:32:12 host sshd[28126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.110.197.87 user=root Jan 12 18:32:12 host sshd[28126]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:32:14 host sshd[28126]: Failed password for invalid user root from 222.110.197.87 port 35985 ssh2 Jan 12 18:32:14 host sshd[28126]: Connection reset by 222.110.197.87 port 35985 [preauth] Jan 12 18:39:18 host sshd[29030]: User root from 125.227.199.193 not allowed because not listed in AllowUsers Jan 12 18:39:18 host sshd[29030]: input_userauth_request: invalid user root [preauth] Jan 12 18:39:18 host unix_chkpwd[29032]: password check failed for user (root) Jan 12 18:39:18 host sshd[29030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.199.193 user=root Jan 12 18:39:18 host sshd[29030]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:39:20 host sshd[29030]: Failed password for invalid user root from 125.227.199.193 port 59146 ssh2 Jan 12 18:39:20 host sshd[29030]: Received disconnect from 125.227.199.193 port 59146:11: Bye Bye [preauth] Jan 12 18:39:20 host sshd[29030]: Disconnected from 125.227.199.193 port 59146 [preauth] Jan 12 18:40:55 host sshd[29239]: User root from 43.134.162.181 not allowed because not listed in AllowUsers Jan 12 18:40:55 host sshd[29239]: input_userauth_request: invalid user root [preauth] Jan 12 18:40:55 host unix_chkpwd[29241]: password check failed for user (root) Jan 12 18:40:55 host sshd[29239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.162.181 user=root Jan 12 18:40:55 host sshd[29239]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:40:57 host sshd[29239]: Failed password for invalid user root from 43.134.162.181 port 57596 ssh2 Jan 12 18:40:57 host sshd[29239]: Received disconnect from 43.134.162.181 port 57596:11: Bye Bye [preauth] Jan 12 18:40:57 host sshd[29239]: Disconnected from 43.134.162.181 port 57596 [preauth] Jan 12 18:42:10 host sshd[29395]: User root from 161.132.219.115 not allowed because not listed in AllowUsers Jan 12 18:42:10 host sshd[29395]: input_userauth_request: invalid user root [preauth] Jan 12 18:42:10 host unix_chkpwd[29398]: password check failed for user (root) Jan 12 18:42:10 host sshd[29395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.219.115 user=root Jan 12 18:42:10 host sshd[29395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:42:13 host sshd[29395]: Failed password for invalid user root from 161.132.219.115 port 46022 ssh2 Jan 12 18:42:13 host sshd[29395]: Received disconnect from 161.132.219.115 port 46022:11: Bye Bye [preauth] Jan 12 18:42:13 host sshd[29395]: Disconnected from 161.132.219.115 port 46022 [preauth] Jan 12 18:42:30 host sshd[29442]: User root from 113.160.244.144 not allowed because not listed in AllowUsers Jan 12 18:42:30 host sshd[29442]: input_userauth_request: invalid user root [preauth] Jan 12 18:42:30 host unix_chkpwd[29444]: password check failed for user (root) Jan 12 18:42:30 host sshd[29442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.160.244.144 user=root Jan 12 18:42:30 host sshd[29442]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:42:31 host sshd[29442]: Failed password for invalid user root from 113.160.244.144 port 50463 ssh2 Jan 12 18:42:31 host sshd[29442]: Received disconnect from 113.160.244.144 port 50463:11: Bye Bye [preauth] Jan 12 18:42:31 host sshd[29442]: Disconnected from 113.160.244.144 port 50463 [preauth] Jan 12 18:42:56 host sshd[29607]: User root from 119.28.118.4 not allowed because not listed in AllowUsers Jan 12 18:42:56 host sshd[29607]: input_userauth_request: invalid user root [preauth] Jan 12 18:42:56 host unix_chkpwd[29611]: password check failed for user (root) Jan 12 18:42:56 host sshd[29607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.118.4 user=root Jan 12 18:42:56 host sshd[29607]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:42:57 host sshd[29612]: User root from 185.244.36.251 not allowed because not listed in AllowUsers Jan 12 18:42:57 host sshd[29612]: input_userauth_request: invalid user root [preauth] Jan 12 18:42:57 host unix_chkpwd[29615]: password check failed for user (root) Jan 12 18:42:57 host sshd[29612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.36.251 user=root Jan 12 18:42:57 host sshd[29612]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:42:57 host sshd[29607]: Failed password for invalid user root from 119.28.118.4 port 42548 ssh2 Jan 12 18:42:57 host sshd[29607]: Received disconnect from 119.28.118.4 port 42548:11: Bye Bye [preauth] Jan 12 18:42:57 host sshd[29607]: Disconnected from 119.28.118.4 port 42548 [preauth] Jan 12 18:43:00 host sshd[29617]: User root from 23.95.68.112 not allowed because not listed in AllowUsers Jan 12 18:43:00 host sshd[29617]: input_userauth_request: invalid user root [preauth] Jan 12 18:43:00 host unix_chkpwd[29627]: password check failed for user (root) Jan 12 18:43:00 host sshd[29617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.68.112 user=root Jan 12 18:43:00 host sshd[29617]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:43:00 host sshd[29612]: Failed password for invalid user root from 185.244.36.251 port 59610 ssh2 Jan 12 18:43:00 host sshd[29612]: Received disconnect from 185.244.36.251 port 59610:11: Bye Bye [preauth] Jan 12 18:43:00 host sshd[29612]: Disconnected from 185.244.36.251 port 59610 [preauth] Jan 12 18:43:02 host sshd[29617]: Failed password for invalid user root from 23.95.68.112 port 36416 ssh2 Jan 12 18:43:02 host sshd[29617]: Received disconnect from 23.95.68.112 port 36416:11: Bye Bye [preauth] Jan 12 18:43:02 host sshd[29617]: Disconnected from 23.95.68.112 port 36416 [preauth] Jan 12 18:44:00 host sshd[29736]: Invalid user admin from 125.139.162.240 port 40441 Jan 12 18:44:00 host sshd[29736]: input_userauth_request: invalid user admin [preauth] Jan 12 18:44:00 host sshd[29736]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:44:00 host sshd[29736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.139.162.240 Jan 12 18:44:01 host sshd[29736]: Failed password for invalid user admin from 125.139.162.240 port 40441 ssh2 Jan 12 18:44:05 host sshd[29736]: Failed password for invalid user admin from 125.139.162.240 port 40441 ssh2 Jan 12 18:44:07 host sshd[29736]: Connection reset by 125.139.162.240 port 40441 [preauth] Jan 12 18:44:25 host sshd[29774]: User root from 59.12.50.20 not allowed because not listed in AllowUsers Jan 12 18:44:25 host sshd[29774]: input_userauth_request: invalid user root [preauth] Jan 12 18:44:25 host unix_chkpwd[29778]: password check failed for user (root) Jan 12 18:44:25 host sshd[29774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.12.50.20 user=root Jan 12 18:44:25 host sshd[29774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:44:27 host sshd[29774]: Failed password for invalid user root from 59.12.50.20 port 36858 ssh2 Jan 12 18:44:27 host sshd[29774]: Received disconnect from 59.12.50.20 port 36858:11: Bye Bye [preauth] Jan 12 18:44:27 host sshd[29774]: Disconnected from 59.12.50.20 port 36858 [preauth] Jan 12 18:44:32 host sshd[29805]: User root from 125.227.199.193 not allowed because not listed in AllowUsers Jan 12 18:44:32 host sshd[29805]: input_userauth_request: invalid user root [preauth] Jan 12 18:44:32 host unix_chkpwd[29808]: password check failed for user (root) Jan 12 18:44:32 host sshd[29805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.199.193 user=root Jan 12 18:44:32 host sshd[29805]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:44:34 host sshd[29805]: Failed password for invalid user root from 125.227.199.193 port 59158 ssh2 Jan 12 18:44:34 host sshd[29805]: Received disconnect from 125.227.199.193 port 59158:11: Bye Bye [preauth] Jan 12 18:44:34 host sshd[29805]: Disconnected from 125.227.199.193 port 59158 [preauth] Jan 12 18:44:39 host sshd[29845]: User root from 113.160.244.144 not allowed because not listed in AllowUsers Jan 12 18:44:39 host sshd[29845]: input_userauth_request: invalid user root [preauth] Jan 12 18:44:39 host unix_chkpwd[29847]: password check failed for user (root) Jan 12 18:44:39 host sshd[29845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.160.244.144 user=root Jan 12 18:44:39 host sshd[29845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:44:41 host sshd[29845]: Failed password for invalid user root from 113.160.244.144 port 45607 ssh2 Jan 12 18:44:41 host sshd[29845]: Received disconnect from 113.160.244.144 port 45607:11: Bye Bye [preauth] Jan 12 18:44:41 host sshd[29845]: Disconnected from 113.160.244.144 port 45607 [preauth] Jan 12 18:45:00 host sshd[29924]: User root from 185.244.36.251 not allowed because not listed in AllowUsers Jan 12 18:45:00 host sshd[29924]: input_userauth_request: invalid user root [preauth] Jan 12 18:45:00 host unix_chkpwd[29927]: password check failed for user (root) Jan 12 18:45:00 host sshd[29924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.36.251 user=root Jan 12 18:45:00 host sshd[29924]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:45:01 host sshd[29917]: Invalid user admin from 221.156.74.184 port 59596 Jan 12 18:45:01 host sshd[29917]: input_userauth_request: invalid user admin [preauth] Jan 12 18:45:01 host sshd[29917]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:45:01 host sshd[29917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.74.184 Jan 12 18:45:02 host sshd[29924]: Failed password for invalid user root from 185.244.36.251 port 51928 ssh2 Jan 12 18:45:02 host sshd[29924]: Received disconnect from 185.244.36.251 port 51928:11: Bye Bye [preauth] Jan 12 18:45:02 host sshd[29924]: Disconnected from 185.244.36.251 port 51928 [preauth] Jan 12 18:45:03 host sshd[29917]: Failed password for invalid user admin from 221.156.74.184 port 59596 ssh2 Jan 12 18:45:04 host sshd[29917]: Failed password for invalid user admin from 221.156.74.184 port 59596 ssh2 Jan 12 18:45:06 host sshd[29917]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:45:08 host sshd[29917]: Failed password for invalid user admin from 221.156.74.184 port 59596 ssh2 Jan 12 18:45:09 host sshd[29917]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:45:10 host sshd[29994]: User root from 43.134.162.181 not allowed because not listed in AllowUsers Jan 12 18:45:10 host sshd[29994]: input_userauth_request: invalid user root [preauth] Jan 12 18:45:10 host unix_chkpwd[29996]: password check failed for user (root) Jan 12 18:45:10 host sshd[29994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.162.181 user=root Jan 12 18:45:10 host sshd[29994]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:45:11 host sshd[29917]: Failed password for invalid user admin from 221.156.74.184 port 59596 ssh2 Jan 12 18:45:11 host sshd[29994]: Failed password for invalid user root from 43.134.162.181 port 48328 ssh2 Jan 12 18:45:11 host sshd[29994]: Received disconnect from 43.134.162.181 port 48328:11: Bye Bye [preauth] Jan 12 18:45:11 host sshd[29994]: Disconnected from 43.134.162.181 port 48328 [preauth] Jan 12 18:45:13 host sshd[29917]: pam_unix(sshd:auth): check pass; user unknown Jan 12 18:45:15 host sshd[29917]: Failed password for invalid user admin from 221.156.74.184 port 59596 ssh2 Jan 12 18:45:32 host sshd[30131]: User root from 23.95.68.112 not allowed because not listed in AllowUsers Jan 12 18:45:32 host sshd[30131]: input_userauth_request: invalid user root [preauth] Jan 12 18:45:32 host unix_chkpwd[30137]: password check failed for user (root) Jan 12 18:45:32 host sshd[30131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.68.112 user=root Jan 12 18:45:32 host sshd[30131]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:45:33 host sshd[30131]: Failed password for invalid user root from 23.95.68.112 port 41808 ssh2 Jan 12 18:45:34 host sshd[30131]: Received disconnect from 23.95.68.112 port 41808:11: Bye Bye [preauth] Jan 12 18:45:34 host sshd[30131]: Disconnected from 23.95.68.112 port 41808 [preauth] Jan 12 18:45:53 host sshd[30206]: User root from 119.28.118.4 not allowed because not listed in AllowUsers Jan 12 18:45:53 host sshd[30206]: input_userauth_request: invalid user root [preauth] Jan 12 18:45:53 host unix_chkpwd[30208]: password check failed for user (root) Jan 12 18:45:53 host sshd[30206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.118.4 user=root Jan 12 18:45:53 host sshd[30206]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:45:55 host sshd[30206]: Failed password for invalid user root from 119.28.118.4 port 48134 ssh2 Jan 12 18:46:05 host sshd[30261]: User root from 59.12.50.20 not allowed because not listed in AllowUsers Jan 12 18:46:05 host sshd[30261]: input_userauth_request: invalid user root [preauth] Jan 12 18:46:05 host unix_chkpwd[30265]: password check failed for user (root) Jan 12 18:46:05 host sshd[30261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.12.50.20 user=root Jan 12 18:46:05 host sshd[30261]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:46:08 host sshd[30261]: Failed password for invalid user root from 59.12.50.20 port 39746 ssh2 Jan 12 18:46:08 host sshd[30261]: Received disconnect from 59.12.50.20 port 39746:11: Bye Bye [preauth] Jan 12 18:46:08 host sshd[30261]: Disconnected from 59.12.50.20 port 39746 [preauth] Jan 12 18:46:40 host sshd[30361]: User root from 161.132.219.115 not allowed because not listed in AllowUsers Jan 12 18:46:40 host sshd[30361]: input_userauth_request: invalid user root [preauth] Jan 12 18:46:40 host unix_chkpwd[30367]: password check failed for user (root) Jan 12 18:46:40 host sshd[30361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.132.219.115 user=root Jan 12 18:46:40 host sshd[30361]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 18:46:42 host sshd[30361]: Failed password for invalid user root from 161.132.219.115 port 57908 ssh2 Jan 12 18:46:42 host sshd[30361]: Received disconnect from 161.132.219.115 port 57908:11: Bye Bye [preauth] Jan 12 18:46:42 host sshd[30361]: Disconnected from 161.132.219.115 port 57908 [preauth] Jan 12 18:50:56 host sshd[30984]: Connection reset by 112.172.83.67 port 37161 [preauth] Jan 12 19:00:21 host sshd[32276]: Did not receive identification string from 85.31.46.253 port 35102 Jan 12 19:00:35 host sshd[32311]: User root from 59.7.189.245 not allowed because not listed in AllowUsers Jan 12 19:00:35 host sshd[32311]: input_userauth_request: invalid user root [preauth] Jan 12 19:00:35 host unix_chkpwd[32315]: password check failed for user (root) Jan 12 19:00:35 host sshd[32311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.7.189.245 user=root Jan 12 19:00:35 host sshd[32311]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:00:38 host sshd[32311]: Failed password for invalid user root from 59.7.189.245 port 62480 ssh2 Jan 12 19:00:38 host sshd[32311]: Connection reset by 59.7.189.245 port 62480 [preauth] Jan 12 19:16:09 host sshd[2079]: User root from 51.38.70.212 not allowed because not listed in AllowUsers Jan 12 19:16:09 host sshd[2079]: input_userauth_request: invalid user root [preauth] Jan 12 19:16:09 host unix_chkpwd[2082]: password check failed for user (root) Jan 12 19:16:09 host sshd[2079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.70.212 user=root Jan 12 19:16:09 host sshd[2079]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:16:11 host sshd[2079]: Failed password for invalid user root from 51.38.70.212 port 54574 ssh2 Jan 12 19:16:11 host sshd[2079]: Received disconnect from 51.38.70.212 port 54574:11: Bye Bye [preauth] Jan 12 19:16:11 host sshd[2079]: Disconnected from 51.38.70.212 port 54574 [preauth] Jan 12 19:16:38 host sshd[2144]: User root from 43.153.98.234 not allowed because not listed in AllowUsers Jan 12 19:16:38 host sshd[2144]: input_userauth_request: invalid user root [preauth] Jan 12 19:16:38 host unix_chkpwd[2147]: password check failed for user (root) Jan 12 19:16:38 host sshd[2144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.98.234 user=root Jan 12 19:16:38 host sshd[2144]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:16:40 host sshd[2144]: Failed password for invalid user root from 43.153.98.234 port 52180 ssh2 Jan 12 19:16:40 host sshd[2144]: Received disconnect from 43.153.98.234 port 52180:11: Bye Bye [preauth] Jan 12 19:16:40 host sshd[2144]: Disconnected from 43.153.98.234 port 52180 [preauth] Jan 12 19:19:10 host sshd[2430]: User root from 94.179.133.22 not allowed because not listed in AllowUsers Jan 12 19:19:10 host sshd[2430]: input_userauth_request: invalid user root [preauth] Jan 12 19:19:10 host unix_chkpwd[2434]: password check failed for user (root) Jan 12 19:19:10 host sshd[2430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.179.133.22 user=root Jan 12 19:19:10 host sshd[2430]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:19:12 host sshd[2430]: Failed password for invalid user root from 94.179.133.22 port 30017 ssh2 Jan 12 19:19:12 host sshd[2430]: Received disconnect from 94.179.133.22 port 30017:11: Bye Bye [preauth] Jan 12 19:19:12 host sshd[2430]: Disconnected from 94.179.133.22 port 30017 [preauth] Jan 12 19:19:15 host sshd[2443]: User root from 51.79.133.20 not allowed because not listed in AllowUsers Jan 12 19:19:15 host sshd[2443]: input_userauth_request: invalid user root [preauth] Jan 12 19:19:15 host unix_chkpwd[2445]: password check failed for user (root) Jan 12 19:19:15 host sshd[2443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.133.20 user=root Jan 12 19:19:15 host sshd[2443]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:19:17 host sshd[2443]: Failed password for invalid user root from 51.79.133.20 port 43834 ssh2 Jan 12 19:19:17 host sshd[2443]: Received disconnect from 51.79.133.20 port 43834:11: Bye Bye [preauth] Jan 12 19:19:17 host sshd[2443]: Disconnected from 51.79.133.20 port 43834 [preauth] Jan 12 19:19:27 host sshd[2457]: User root from 132.145.168.70 not allowed because not listed in AllowUsers Jan 12 19:19:27 host sshd[2457]: input_userauth_request: invalid user root [preauth] Jan 12 19:19:27 host unix_chkpwd[2461]: password check failed for user (root) Jan 12 19:19:27 host sshd[2457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.168.70 user=root Jan 12 19:19:27 host sshd[2457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:19:29 host sshd[2457]: Failed password for invalid user root from 132.145.168.70 port 53340 ssh2 Jan 12 19:19:29 host sshd[2457]: Received disconnect from 132.145.168.70 port 53340:11: Bye Bye [preauth] Jan 12 19:19:29 host sshd[2457]: Disconnected from 132.145.168.70 port 53340 [preauth] Jan 12 19:19:31 host sshd[2487]: User root from 178.62.17.94 not allowed because not listed in AllowUsers Jan 12 19:19:31 host sshd[2487]: input_userauth_request: invalid user root [preauth] Jan 12 19:19:31 host unix_chkpwd[2490]: password check failed for user (root) Jan 12 19:19:31 host sshd[2487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.17.94 user=root Jan 12 19:19:31 host sshd[2487]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:19:33 host sshd[2487]: Failed password for invalid user root from 178.62.17.94 port 59940 ssh2 Jan 12 19:19:33 host sshd[2487]: Received disconnect from 178.62.17.94 port 59940:11: Bye Bye [preauth] Jan 12 19:19:33 host sshd[2487]: Disconnected from 178.62.17.94 port 59940 [preauth] Jan 12 19:19:35 host sshd[2494]: User root from 101.78.234.109 not allowed because not listed in AllowUsers Jan 12 19:19:35 host sshd[2494]: input_userauth_request: invalid user root [preauth] Jan 12 19:19:35 host unix_chkpwd[2497]: password check failed for user (root) Jan 12 19:19:35 host sshd[2494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.234.109 user=root Jan 12 19:19:35 host sshd[2494]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:19:37 host sshd[2494]: Failed password for invalid user root from 101.78.234.109 port 52366 ssh2 Jan 12 19:19:37 host sshd[2494]: Received disconnect from 101.78.234.109 port 52366:11: Bye Bye [preauth] Jan 12 19:19:37 host sshd[2494]: Disconnected from 101.78.234.109 port 52366 [preauth] Jan 12 19:19:55 host sshd[2522]: User root from 43.153.72.103 not allowed because not listed in AllowUsers Jan 12 19:19:55 host sshd[2522]: input_userauth_request: invalid user root [preauth] Jan 12 19:19:55 host unix_chkpwd[2524]: password check failed for user (root) Jan 12 19:19:55 host sshd[2522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.72.103 user=root Jan 12 19:19:55 host sshd[2522]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:19:57 host sshd[2522]: Failed password for invalid user root from 43.153.72.103 port 53580 ssh2 Jan 12 19:19:57 host sshd[2522]: Received disconnect from 43.153.72.103 port 53580:11: Bye Bye [preauth] Jan 12 19:19:57 host sshd[2522]: Disconnected from 43.153.72.103 port 53580 [preauth] Jan 12 19:20:55 host sshd[2823]: User root from 200.159.243.141 not allowed because not listed in AllowUsers Jan 12 19:20:55 host sshd[2823]: input_userauth_request: invalid user root [preauth] Jan 12 19:20:55 host unix_chkpwd[2829]: password check failed for user (root) Jan 12 19:20:55 host sshd[2823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.159.243.141 user=root Jan 12 19:20:55 host sshd[2823]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:20:57 host sshd[2823]: Failed password for invalid user root from 200.159.243.141 port 49856 ssh2 Jan 12 19:20:57 host sshd[2823]: Received disconnect from 200.159.243.141 port 49856:11: Bye Bye [preauth] Jan 12 19:20:57 host sshd[2823]: Disconnected from 200.159.243.141 port 49856 [preauth] Jan 12 19:21:20 host sshd[2869]: User root from 51.38.70.212 not allowed because not listed in AllowUsers Jan 12 19:21:20 host sshd[2869]: input_userauth_request: invalid user root [preauth] Jan 12 19:21:20 host unix_chkpwd[2872]: password check failed for user (root) Jan 12 19:21:20 host sshd[2869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.70.212 user=root Jan 12 19:21:20 host sshd[2869]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:21:22 host sshd[2869]: Failed password for invalid user root from 51.38.70.212 port 37818 ssh2 Jan 12 19:21:22 host sshd[2869]: Received disconnect from 51.38.70.212 port 37818:11: Bye Bye [preauth] Jan 12 19:21:22 host sshd[2869]: Disconnected from 51.38.70.212 port 37818 [preauth] Jan 12 19:21:32 host sshd[2940]: User root from 178.62.17.94 not allowed because not listed in AllowUsers Jan 12 19:21:32 host sshd[2940]: input_userauth_request: invalid user root [preauth] Jan 12 19:21:32 host unix_chkpwd[2943]: password check failed for user (root) Jan 12 19:21:32 host sshd[2940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.17.94 user=root Jan 12 19:21:32 host sshd[2940]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:21:33 host sshd[2940]: Failed password for invalid user root from 178.62.17.94 port 33932 ssh2 Jan 12 19:21:34 host sshd[2940]: Received disconnect from 178.62.17.94 port 33932:11: Bye Bye [preauth] Jan 12 19:21:34 host sshd[2940]: Disconnected from 178.62.17.94 port 33932 [preauth] Jan 12 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 19:21:57 host sshd[3007]: User root from 94.179.133.22 not allowed because not listed in AllowUsers Jan 12 19:21:57 host sshd[3007]: input_userauth_request: invalid user root [preauth] Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 19:21:57 host unix_chkpwd[3040]: password check failed for user (root) Jan 12 19:21:57 host sshd[3007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.179.133.22 user=root Jan 12 19:21:57 host sshd[3007]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:21:59 host sshd[3007]: Failed password for invalid user root from 94.179.133.22 port 50497 ssh2 Jan 12 19:21:59 host sshd[3007]: Received disconnect from 94.179.133.22 port 50497:11: Bye Bye [preauth] Jan 12 19:21:59 host sshd[3007]: Disconnected from 94.179.133.22 port 50497 [preauth] Jan 12 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=remysagr user-23=disposeat user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 19:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bEmMKKRyQcDPk88c.~ Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bEmMKKRyQcDPk88c.~' Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bEmMKKRyQcDPk88c.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 19:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 19:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 19:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 19:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 19:23:03 host sshd[3416]: User root from 217.64.140.182 not allowed because not listed in AllowUsers Jan 12 19:23:03 host sshd[3416]: input_userauth_request: invalid user root [preauth] Jan 12 19:23:03 host unix_chkpwd[3419]: password check failed for user (root) Jan 12 19:23:03 host sshd[3416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.64.140.182 user=root Jan 12 19:23:03 host sshd[3416]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:23:04 host sshd[3416]: Failed password for invalid user root from 217.64.140.182 port 43118 ssh2 Jan 12 19:23:05 host sshd[3416]: Received disconnect from 217.64.140.182 port 43118:11: Bye Bye [preauth] Jan 12 19:23:05 host sshd[3416]: Disconnected from 217.64.140.182 port 43118 [preauth] Jan 12 19:23:43 host sshd[3491]: User root from 132.145.168.70 not allowed because not listed in AllowUsers Jan 12 19:23:43 host sshd[3491]: input_userauth_request: invalid user root [preauth] Jan 12 19:23:43 host unix_chkpwd[3496]: password check failed for user (root) Jan 12 19:23:43 host sshd[3491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.168.70 user=root Jan 12 19:23:43 host sshd[3491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:23:45 host sshd[3491]: Failed password for invalid user root from 132.145.168.70 port 47872 ssh2 Jan 12 19:23:45 host sshd[3491]: Received disconnect from 132.145.168.70 port 47872:11: Bye Bye [preauth] Jan 12 19:23:45 host sshd[3491]: Disconnected from 132.145.168.70 port 47872 [preauth] Jan 12 19:23:47 host sshd[3493]: User root from 200.159.243.141 not allowed because not listed in AllowUsers Jan 12 19:23:47 host sshd[3493]: input_userauth_request: invalid user root [preauth] Jan 12 19:23:47 host unix_chkpwd[3536]: password check failed for user (root) Jan 12 19:23:47 host sshd[3493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.159.243.141 user=root Jan 12 19:23:47 host sshd[3493]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:23:49 host sshd[3493]: Failed password for invalid user root from 200.159.243.141 port 51248 ssh2 Jan 12 19:23:59 host sshd[3581]: User root from 146.4.92.212 not allowed because not listed in AllowUsers Jan 12 19:23:59 host sshd[3581]: input_userauth_request: invalid user root [preauth] Jan 12 19:23:59 host unix_chkpwd[3583]: password check failed for user (root) Jan 12 19:23:59 host sshd[3581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.4.92.212 user=root Jan 12 19:23:59 host sshd[3581]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:24:01 host sshd[3581]: Failed password for invalid user root from 146.4.92.212 port 50856 ssh2 Jan 12 19:24:01 host sshd[3581]: Received disconnect from 146.4.92.212 port 50856:11: Bye Bye [preauth] Jan 12 19:24:01 host sshd[3581]: Disconnected from 146.4.92.212 port 50856 [preauth] Jan 12 19:24:54 host sshd[3711]: User root from 101.78.234.109 not allowed because not listed in AllowUsers Jan 12 19:24:54 host sshd[3711]: input_userauth_request: invalid user root [preauth] Jan 12 19:24:54 host unix_chkpwd[3714]: password check failed for user (root) Jan 12 19:24:54 host sshd[3711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.234.109 user=root Jan 12 19:24:54 host sshd[3711]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:24:56 host sshd[3711]: Failed password for invalid user root from 101.78.234.109 port 52378 ssh2 Jan 12 19:25:11 host sshd[3806]: User root from 43.153.72.103 not allowed because not listed in AllowUsers Jan 12 19:25:11 host sshd[3806]: input_userauth_request: invalid user root [preauth] Jan 12 19:25:11 host unix_chkpwd[3809]: password check failed for user (root) Jan 12 19:25:11 host sshd[3806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.72.103 user=root Jan 12 19:25:11 host sshd[3806]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:25:14 host sshd[3806]: Failed password for invalid user root from 43.153.72.103 port 52776 ssh2 Jan 12 19:25:14 host sshd[3806]: Received disconnect from 43.153.72.103 port 52776:11: Bye Bye [preauth] Jan 12 19:25:14 host sshd[3806]: Disconnected from 43.153.72.103 port 52776 [preauth] Jan 12 19:25:22 host sshd[3855]: User root from 51.79.133.20 not allowed because not listed in AllowUsers Jan 12 19:25:22 host sshd[3855]: input_userauth_request: invalid user root [preauth] Jan 12 19:25:22 host unix_chkpwd[3857]: password check failed for user (root) Jan 12 19:25:22 host sshd[3855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.133.20 user=root Jan 12 19:25:22 host sshd[3855]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:25:25 host sshd[3855]: Failed password for invalid user root from 51.79.133.20 port 46276 ssh2 Jan 12 19:25:25 host sshd[3855]: Received disconnect from 51.79.133.20 port 46276:11: Bye Bye [preauth] Jan 12 19:25:25 host sshd[3855]: Disconnected from 51.79.133.20 port 46276 [preauth] Jan 12 19:25:26 host sshd[3860]: User root from 40.88.35.229 not allowed because not listed in AllowUsers Jan 12 19:25:26 host sshd[3860]: input_userauth_request: invalid user root [preauth] Jan 12 19:25:26 host unix_chkpwd[3883]: password check failed for user (root) Jan 12 19:25:26 host sshd[3860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.88.35.229 user=root Jan 12 19:25:26 host sshd[3860]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:25:28 host sshd[3860]: Failed password for invalid user root from 40.88.35.229 port 37682 ssh2 Jan 12 19:25:28 host sshd[3860]: Received disconnect from 40.88.35.229 port 37682:11: Bye Bye [preauth] Jan 12 19:25:28 host sshd[3860]: Disconnected from 40.88.35.229 port 37682 [preauth] Jan 12 19:25:36 host sshd[3937]: User root from 43.154.172.227 not allowed because not listed in AllowUsers Jan 12 19:25:36 host sshd[3937]: input_userauth_request: invalid user root [preauth] Jan 12 19:25:36 host unix_chkpwd[3939]: password check failed for user (root) Jan 12 19:25:36 host sshd[3937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.172.227 user=root Jan 12 19:25:36 host sshd[3937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:25:38 host sshd[3937]: Failed password for invalid user root from 43.154.172.227 port 54044 ssh2 Jan 12 19:25:38 host sshd[3937]: Received disconnect from 43.154.172.227 port 54044:11: Bye Bye [preauth] Jan 12 19:25:38 host sshd[3937]: Disconnected from 43.154.172.227 port 54044 [preauth] Jan 12 19:26:16 host sshd[4002]: User root from 43.153.98.234 not allowed because not listed in AllowUsers Jan 12 19:26:16 host sshd[4002]: input_userauth_request: invalid user root [preauth] Jan 12 19:26:16 host unix_chkpwd[4006]: password check failed for user (root) Jan 12 19:26:16 host sshd[4002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.98.234 user=root Jan 12 19:26:16 host sshd[4002]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:26:19 host sshd[4002]: Failed password for invalid user root from 43.153.98.234 port 43278 ssh2 Jan 12 19:26:19 host sshd[4002]: Received disconnect from 43.153.98.234 port 43278:11: Bye Bye [preauth] Jan 12 19:26:19 host sshd[4002]: Disconnected from 43.153.98.234 port 43278 [preauth] Jan 12 19:26:32 host sshd[4184]: User root from 146.4.92.212 not allowed because not listed in AllowUsers Jan 12 19:26:32 host sshd[4184]: input_userauth_request: invalid user root [preauth] Jan 12 19:26:32 host unix_chkpwd[4186]: password check failed for user (root) Jan 12 19:26:32 host sshd[4184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.4.92.212 user=root Jan 12 19:26:32 host sshd[4184]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:26:34 host sshd[4184]: Failed password for invalid user root from 146.4.92.212 port 35370 ssh2 Jan 12 19:26:34 host sshd[4184]: Received disconnect from 146.4.92.212 port 35370:11: Bye Bye [preauth] Jan 12 19:26:34 host sshd[4184]: Disconnected from 146.4.92.212 port 35370 [preauth] Jan 12 19:27:03 host sshd[4284]: User root from 217.64.140.182 not allowed because not listed in AllowUsers Jan 12 19:27:03 host sshd[4284]: input_userauth_request: invalid user root [preauth] Jan 12 19:27:03 host unix_chkpwd[4288]: password check failed for user (root) Jan 12 19:27:03 host sshd[4284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.64.140.182 user=root Jan 12 19:27:03 host sshd[4284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:27:05 host sshd[4284]: Failed password for invalid user root from 217.64.140.182 port 56300 ssh2 Jan 12 19:27:05 host sshd[4284]: Received disconnect from 217.64.140.182 port 56300:11: Bye Bye [preauth] Jan 12 19:27:05 host sshd[4284]: Disconnected from 217.64.140.182 port 56300 [preauth] Jan 12 19:27:07 host sshd[4326]: User root from 43.154.172.227 not allowed because not listed in AllowUsers Jan 12 19:27:07 host sshd[4326]: input_userauth_request: invalid user root [preauth] Jan 12 19:27:07 host unix_chkpwd[4329]: password check failed for user (root) Jan 12 19:27:07 host sshd[4326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.172.227 user=root Jan 12 19:27:07 host sshd[4326]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:27:09 host sshd[4326]: Failed password for invalid user root from 43.154.172.227 port 50266 ssh2 Jan 12 19:27:09 host sshd[4326]: Received disconnect from 43.154.172.227 port 50266:11: Bye Bye [preauth] Jan 12 19:27:09 host sshd[4326]: Disconnected from 43.154.172.227 port 50266 [preauth] Jan 12 19:29:39 host sshd[4696]: User root from 40.88.35.229 not allowed because not listed in AllowUsers Jan 12 19:29:39 host sshd[4696]: input_userauth_request: invalid user root [preauth] Jan 12 19:29:39 host unix_chkpwd[4701]: password check failed for user (root) Jan 12 19:29:39 host sshd[4696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.88.35.229 user=root Jan 12 19:29:39 host sshd[4696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:29:41 host sshd[4696]: Failed password for invalid user root from 40.88.35.229 port 50964 ssh2 Jan 12 19:40:07 host sshd[6117]: User root from 144.126.217.31 not allowed because not listed in AllowUsers Jan 12 19:40:07 host sshd[6117]: input_userauth_request: invalid user root [preauth] Jan 12 19:40:08 host unix_chkpwd[6120]: password check failed for user (root) Jan 12 19:40:08 host sshd[6117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.126.217.31 user=root Jan 12 19:40:08 host sshd[6117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:40:09 host sshd[6117]: Failed password for invalid user root from 144.126.217.31 port 35122 ssh2 Jan 12 19:40:10 host sshd[6117]: Received disconnect from 144.126.217.31 port 35122:11: Bye Bye [preauth] Jan 12 19:40:10 host sshd[6117]: Disconnected from 144.126.217.31 port 35122 [preauth] Jan 12 19:41:19 host sshd[6240]: User root from 190.128.171.250 not allowed because not listed in AllowUsers Jan 12 19:41:19 host sshd[6240]: input_userauth_request: invalid user root [preauth] Jan 12 19:41:19 host unix_chkpwd[6243]: password check failed for user (root) Jan 12 19:41:19 host sshd[6240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.171.250 user=root Jan 12 19:41:19 host sshd[6240]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:41:21 host sshd[6240]: Failed password for invalid user root from 190.128.171.250 port 47044 ssh2 Jan 12 19:41:21 host sshd[6240]: Received disconnect from 190.128.171.250 port 47044:11: Bye Bye [preauth] Jan 12 19:41:21 host sshd[6240]: Disconnected from 190.128.171.250 port 47044 [preauth] Jan 12 19:43:15 host sshd[6447]: User root from 190.128.171.250 not allowed because not listed in AllowUsers Jan 12 19:43:15 host sshd[6447]: input_userauth_request: invalid user root [preauth] Jan 12 19:43:15 host unix_chkpwd[6450]: password check failed for user (root) Jan 12 19:43:15 host sshd[6447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.171.250 user=root Jan 12 19:43:15 host sshd[6447]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:43:17 host sshd[6447]: Failed password for invalid user root from 190.128.171.250 port 55150 ssh2 Jan 12 19:44:27 host sshd[6716]: User root from 177.102.4.203 not allowed because not listed in AllowUsers Jan 12 19:44:27 host sshd[6716]: input_userauth_request: invalid user root [preauth] Jan 12 19:44:27 host unix_chkpwd[6751]: password check failed for user (root) Jan 12 19:44:27 host sshd[6716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.102.4.203 user=root Jan 12 19:44:27 host sshd[6716]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:44:29 host sshd[6716]: Failed password for invalid user root from 177.102.4.203 port 34844 ssh2 Jan 12 19:44:29 host sshd[6716]: Received disconnect from 177.102.4.203 port 34844:11: Bye Bye [preauth] Jan 12 19:44:29 host sshd[6716]: Disconnected from 177.102.4.203 port 34844 [preauth] Jan 12 19:45:34 host sshd[6993]: User root from 144.126.217.31 not allowed because not listed in AllowUsers Jan 12 19:45:34 host sshd[6993]: input_userauth_request: invalid user root [preauth] Jan 12 19:45:34 host unix_chkpwd[7000]: password check failed for user (root) Jan 12 19:45:34 host sshd[6993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.126.217.31 user=root Jan 12 19:45:34 host sshd[6993]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:45:36 host sshd[6993]: Failed password for invalid user root from 144.126.217.31 port 35554 ssh2 Jan 12 19:45:36 host sshd[6993]: Received disconnect from 144.126.217.31 port 35554:11: Bye Bye [preauth] Jan 12 19:45:36 host sshd[6993]: Disconnected from 144.126.217.31 port 35554 [preauth] Jan 12 19:45:48 host sshd[7096]: User root from 203.113.167.3 not allowed because not listed in AllowUsers Jan 12 19:45:48 host sshd[7096]: input_userauth_request: invalid user root [preauth] Jan 12 19:45:48 host unix_chkpwd[7100]: password check failed for user (root) Jan 12 19:45:48 host sshd[7096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.113.167.3 user=root Jan 12 19:45:48 host sshd[7096]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:45:48 host sshd[7094]: User root from 142.93.225.189 not allowed because not listed in AllowUsers Jan 12 19:45:48 host sshd[7094]: input_userauth_request: invalid user root [preauth] Jan 12 19:45:48 host unix_chkpwd[7101]: password check failed for user (root) Jan 12 19:45:48 host sshd[7094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.225.189 user=root Jan 12 19:45:48 host sshd[7094]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:45:50 host sshd[7096]: Failed password for invalid user root from 203.113.167.3 port 35474 ssh2 Jan 12 19:45:51 host sshd[7096]: Received disconnect from 203.113.167.3 port 35474:11: Bye Bye [preauth] Jan 12 19:45:51 host sshd[7096]: Disconnected from 203.113.167.3 port 35474 [preauth] Jan 12 19:45:51 host sshd[7094]: Failed password for invalid user root from 142.93.225.189 port 55472 ssh2 Jan 12 19:45:51 host sshd[7094]: Received disconnect from 142.93.225.189 port 55472:11: Bye Bye [preauth] Jan 12 19:45:51 host sshd[7094]: Disconnected from 142.93.225.189 port 55472 [preauth] Jan 12 19:47:06 host sshd[7362]: User root from 142.93.225.189 not allowed because not listed in AllowUsers Jan 12 19:47:06 host sshd[7362]: input_userauth_request: invalid user root [preauth] Jan 12 19:47:06 host unix_chkpwd[7367]: password check failed for user (root) Jan 12 19:47:06 host sshd[7362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.225.189 user=root Jan 12 19:47:06 host sshd[7362]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:47:09 host sshd[7362]: Failed password for invalid user root from 142.93.225.189 port 51206 ssh2 Jan 12 19:47:09 host sshd[7362]: Received disconnect from 142.93.225.189 port 51206:11: Bye Bye [preauth] Jan 12 19:47:09 host sshd[7362]: Disconnected from 142.93.225.189 port 51206 [preauth] Jan 12 19:47:24 host sshd[7416]: User root from 177.102.4.203 not allowed because not listed in AllowUsers Jan 12 19:47:24 host sshd[7416]: input_userauth_request: invalid user root [preauth] Jan 12 19:47:24 host unix_chkpwd[7423]: password check failed for user (root) Jan 12 19:47:24 host sshd[7416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.102.4.203 user=root Jan 12 19:47:24 host sshd[7416]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:47:26 host sshd[7416]: Failed password for invalid user root from 177.102.4.203 port 41858 ssh2 Jan 12 19:47:26 host sshd[7416]: Received disconnect from 177.102.4.203 port 41858:11: Bye Bye [preauth] Jan 12 19:47:26 host sshd[7416]: Disconnected from 177.102.4.203 port 41858 [preauth] Jan 12 19:47:27 host sshd[7441]: User root from 203.113.167.3 not allowed because not listed in AllowUsers Jan 12 19:47:27 host sshd[7441]: input_userauth_request: invalid user root [preauth] Jan 12 19:47:27 host unix_chkpwd[7463]: password check failed for user (root) Jan 12 19:47:27 host sshd[7441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.113.167.3 user=root Jan 12 19:47:27 host sshd[7441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:47:29 host sshd[7441]: Failed password for invalid user root from 203.113.167.3 port 36940 ssh2 Jan 12 19:47:29 host sshd[7441]: Received disconnect from 203.113.167.3 port 36940:11: Bye Bye [preauth] Jan 12 19:47:29 host sshd[7441]: Disconnected from 203.113.167.3 port 36940 [preauth] Jan 12 19:52:21 host sshd[8137]: Connection reset by 27.115.182.242 port 60765 [preauth] Jan 12 19:52:45 host sshd[8186]: Invalid user ONTUSER from 221.158.221.63 port 61985 Jan 12 19:52:45 host sshd[8186]: input_userauth_request: invalid user ONTUSER [preauth] Jan 12 19:52:45 host sshd[8186]: pam_unix(sshd:auth): check pass; user unknown Jan 12 19:52:45 host sshd[8186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.158.221.63 Jan 12 19:52:47 host sshd[8186]: Failed password for invalid user ONTUSER from 221.158.221.63 port 61985 ssh2 Jan 12 19:52:48 host sshd[8186]: pam_unix(sshd:auth): check pass; user unknown Jan 12 19:52:51 host sshd[8186]: Failed password for invalid user ONTUSER from 221.158.221.63 port 61985 ssh2 Jan 12 19:52:53 host sshd[8186]: Failed password for invalid user ONTUSER from 221.158.221.63 port 61985 ssh2 Jan 12 19:52:53 host sshd[8186]: Connection closed by 221.158.221.63 port 61985 [preauth] Jan 12 19:52:53 host sshd[8186]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.158.221.63 Jan 12 19:54:00 host sshd[8406]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 12 19:54:00 host sshd[8406]: input_userauth_request: invalid user root [preauth] Jan 12 19:54:01 host unix_chkpwd[8409]: password check failed for user (root) Jan 12 19:54:01 host sshd[8406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 12 19:54:01 host sshd[8406]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 19:54:03 host sshd[8406]: Failed password for invalid user root from 209.141.55.27 port 33394 ssh2 Jan 12 19:54:03 host sshd[8406]: Received disconnect from 209.141.55.27 port 33394:11: Normal Shutdown, Thank you for playing [preauth] Jan 12 19:54:03 host sshd[8406]: Disconnected from 209.141.55.27 port 33394 [preauth] Jan 12 19:57:26 host sshd[8825]: Invalid user db from 194.110.203.109 port 41602 Jan 12 19:57:26 host sshd[8825]: input_userauth_request: invalid user db [preauth] Jan 12 19:57:26 host sshd[8825]: pam_unix(sshd:auth): check pass; user unknown Jan 12 19:57:26 host sshd[8825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 19:57:28 host sshd[8825]: Failed password for invalid user db from 194.110.203.109 port 41602 ssh2 Jan 12 19:57:31 host sshd[8825]: pam_unix(sshd:auth): check pass; user unknown Jan 12 19:57:33 host sshd[8825]: Failed password for invalid user db from 194.110.203.109 port 41602 ssh2 Jan 12 19:57:36 host sshd[8825]: pam_unix(sshd:auth): check pass; user unknown Jan 12 19:57:38 host sshd[8825]: Failed password for invalid user db from 194.110.203.109 port 41602 ssh2 Jan 12 19:57:41 host sshd[8825]: Connection closed by 194.110.203.109 port 41602 [preauth] Jan 12 19:57:41 host sshd[8825]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 20:06:57 host sshd[10177]: Invalid user zyfwp from 66.168.178.193 port 51778 Jan 12 20:06:57 host sshd[10177]: input_userauth_request: invalid user zyfwp [preauth] Jan 12 20:06:57 host sshd[10177]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:06:57 host sshd[10177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.168.178.193 Jan 12 20:06:59 host sshd[10177]: Failed password for invalid user zyfwp from 66.168.178.193 port 51778 ssh2 Jan 12 20:07:00 host sshd[10177]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:07:02 host sshd[10177]: Failed password for invalid user zyfwp from 66.168.178.193 port 51778 ssh2 Jan 12 20:07:02 host sshd[10177]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:07:04 host sshd[10177]: Failed password for invalid user zyfwp from 66.168.178.193 port 51778 ssh2 Jan 12 20:07:06 host sshd[10177]: Connection closed by 66.168.178.193 port 51778 [preauth] Jan 12 20:07:06 host sshd[10177]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.168.178.193 Jan 12 20:09:54 host sshd[10525]: Invalid user usr from 14.36.97.102 port 33698 Jan 12 20:09:54 host sshd[10525]: input_userauth_request: invalid user usr [preauth] Jan 12 20:09:54 host sshd[10525]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:09:54 host sshd[10525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.36.97.102 Jan 12 20:09:56 host sshd[10525]: Failed password for invalid user usr from 14.36.97.102 port 33698 ssh2 Jan 12 20:09:57 host sshd[10525]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:09:59 host sshd[10525]: Failed password for invalid user usr from 14.36.97.102 port 33698 ssh2 Jan 12 20:10:00 host sshd[10525]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:10:02 host sshd[10525]: Failed password for invalid user usr from 14.36.97.102 port 33698 ssh2 Jan 12 20:10:04 host sshd[10525]: Connection reset by 14.36.97.102 port 33698 [preauth] Jan 12 20:10:04 host sshd[10525]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.36.97.102 Jan 12 20:21:45 host sshd[12251]: Did not receive identification string from 123.58.197.78 port 23482 Jan 12 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=keralaholi user-10=wwwresourcehunte user-11=wwwrmswll user-12=remysagr user-13=disposeat user-14=wwwkmaorg user-15=wwwkapin user-16=woodpeck user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=kottayamcalldriv user-26=phmetals user-27=palco123 user-28=gifterman user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 20:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zoWJZfoKC6IhWGVW.~ Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zoWJZfoKC6IhWGVW.~' Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zoWJZfoKC6IhWGVW.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 20:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 20:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 20:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 20:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 20:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 20:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 20:25:25 host sshd[12870]: Bad protocol version identification '' from 183.60.90.149 port 59998 Jan 12 20:25:27 host sshd[12871]: User root from 183.60.90.149 not allowed because not listed in AllowUsers Jan 12 20:25:27 host sshd[12871]: input_userauth_request: invalid user root [preauth] Jan 12 20:25:28 host unix_chkpwd[12875]: password check failed for user (root) Jan 12 20:25:28 host sshd[12871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.60.90.149 user=root Jan 12 20:25:28 host sshd[12871]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:25:29 host sshd[12871]: Failed password for invalid user root from 183.60.90.149 port 40072 ssh2 Jan 12 20:25:30 host sshd[12871]: Connection closed by 183.60.90.149 port 40072 [preauth] Jan 12 20:25:32 host sshd[12904]: User root from 183.60.90.149 not allowed because not listed in AllowUsers Jan 12 20:25:32 host sshd[12904]: input_userauth_request: invalid user root [preauth] Jan 12 20:25:32 host unix_chkpwd[12908]: password check failed for user (root) Jan 12 20:25:32 host sshd[12904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.60.90.149 user=root Jan 12 20:25:32 host sshd[12904]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:25:34 host sshd[12904]: Failed password for invalid user root from 183.60.90.149 port 52794 ssh2 Jan 12 20:29:36 host sshd[13497]: User root from 211.105.79.221 not allowed because not listed in AllowUsers Jan 12 20:29:36 host sshd[13497]: input_userauth_request: invalid user root [preauth] Jan 12 20:29:36 host unix_chkpwd[13500]: password check failed for user (root) Jan 12 20:29:36 host sshd[13497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.105.79.221 user=root Jan 12 20:29:36 host sshd[13497]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:29:38 host sshd[13497]: Failed password for invalid user root from 211.105.79.221 port 44841 ssh2 Jan 12 20:29:39 host unix_chkpwd[13503]: password check failed for user (root) Jan 12 20:29:39 host sshd[13497]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:29:41 host sshd[13497]: Failed password for invalid user root from 211.105.79.221 port 44841 ssh2 Jan 12 20:29:41 host sshd[13497]: Connection reset by 211.105.79.221 port 44841 [preauth] Jan 12 20:29:41 host sshd[13497]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.105.79.221 user=root Jan 12 20:29:53 host sshd[13519]: Invalid user anonymous from 74.40.14.103 port 53157 Jan 12 20:29:53 host sshd[13519]: input_userauth_request: invalid user anonymous [preauth] Jan 12 20:29:53 host sshd[13519]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:29:53 host sshd[13519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.40.14.103 Jan 12 20:29:56 host sshd[13519]: Failed password for invalid user anonymous from 74.40.14.103 port 53157 ssh2 Jan 12 20:29:56 host sshd[13519]: Connection closed by 74.40.14.103 port 53157 [preauth] Jan 12 20:34:28 host sshd[14133]: User root from 159.65.41.104 not allowed because not listed in AllowUsers Jan 12 20:34:28 host sshd[14133]: input_userauth_request: invalid user root [preauth] Jan 12 20:34:28 host unix_chkpwd[14159]: password check failed for user (root) Jan 12 20:34:28 host sshd[14133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.41.104 user=root Jan 12 20:34:28 host sshd[14133]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:34:30 host sshd[14133]: Failed password for invalid user root from 159.65.41.104 port 39570 ssh2 Jan 12 20:34:30 host sshd[14133]: Received disconnect from 159.65.41.104 port 39570:11: Bye Bye [preauth] Jan 12 20:34:30 host sshd[14133]: Disconnected from 159.65.41.104 port 39570 [preauth] Jan 12 20:34:38 host sshd[14167]: User root from 39.91.166.21 not allowed because not listed in AllowUsers Jan 12 20:34:38 host sshd[14167]: input_userauth_request: invalid user root [preauth] Jan 12 20:34:38 host unix_chkpwd[14171]: password check failed for user (root) Jan 12 20:34:38 host sshd[14167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.91.166.21 user=root Jan 12 20:34:38 host sshd[14167]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:34:40 host sshd[14167]: Failed password for invalid user root from 39.91.166.21 port 49318 ssh2 Jan 12 20:34:40 host sshd[14167]: Received disconnect from 39.91.166.21 port 49318:11: Bye Bye [preauth] Jan 12 20:34:40 host sshd[14167]: Disconnected from 39.91.166.21 port 49318 [preauth] Jan 12 20:37:00 host sshd[14433]: User root from 43.157.14.134 not allowed because not listed in AllowUsers Jan 12 20:37:00 host sshd[14433]: input_userauth_request: invalid user root [preauth] Jan 12 20:37:00 host unix_chkpwd[14436]: password check failed for user (root) Jan 12 20:37:00 host sshd[14433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.14.134 user=root Jan 12 20:37:00 host sshd[14433]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:37:02 host sshd[14433]: Failed password for invalid user root from 43.157.14.134 port 41368 ssh2 Jan 12 20:37:02 host sshd[14433]: Received disconnect from 43.157.14.134 port 41368:11: Bye Bye [preauth] Jan 12 20:37:02 host sshd[14433]: Disconnected from 43.157.14.134 port 41368 [preauth] Jan 12 20:38:20 host sshd[14691]: Invalid user pi from 211.223.84.206 port 63286 Jan 12 20:38:20 host sshd[14691]: input_userauth_request: invalid user pi [preauth] Jan 12 20:38:20 host sshd[14691]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:38:20 host sshd[14691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.223.84.206 Jan 12 20:38:22 host sshd[14691]: Failed password for invalid user pi from 211.223.84.206 port 63286 ssh2 Jan 12 20:38:23 host sshd[14691]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:38:24 host sshd[14691]: Failed password for invalid user pi from 211.223.84.206 port 63286 ssh2 Jan 12 20:38:25 host sshd[14691]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:38:27 host sshd[14691]: Failed password for invalid user pi from 211.223.84.206 port 63286 ssh2 Jan 12 20:38:28 host sshd[14691]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:38:29 host sshd[14691]: Failed password for invalid user pi from 211.223.84.206 port 63286 ssh2 Jan 12 20:38:30 host sshd[14691]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:38:32 host sshd[14691]: Failed password for invalid user pi from 211.223.84.206 port 63286 ssh2 Jan 12 20:38:32 host sshd[14691]: Connection reset by 211.223.84.206 port 63286 [preauth] Jan 12 20:38:32 host sshd[14691]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.223.84.206 Jan 12 20:38:32 host sshd[14691]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 12 20:38:46 host sshd[14778]: Invalid user vadmin from 115.161.167.24 port 42339 Jan 12 20:38:46 host sshd[14778]: input_userauth_request: invalid user vadmin [preauth] Jan 12 20:38:46 host sshd[14778]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:38:46 host sshd[14778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.161.167.24 Jan 12 20:38:48 host sshd[14778]: Failed password for invalid user vadmin from 115.161.167.24 port 42339 ssh2 Jan 12 20:38:48 host sshd[14778]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:38:50 host sshd[14778]: Failed password for invalid user vadmin from 115.161.167.24 port 42339 ssh2 Jan 12 20:38:50 host sshd[14778]: Connection closed by 115.161.167.24 port 42339 [preauth] Jan 12 20:38:50 host sshd[14778]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.161.167.24 Jan 12 20:40:13 host sshd[14959]: User root from 157.245.108.35 not allowed because not listed in AllowUsers Jan 12 20:40:13 host sshd[14959]: input_userauth_request: invalid user root [preauth] Jan 12 20:40:13 host unix_chkpwd[14961]: password check failed for user (root) Jan 12 20:40:13 host sshd[14959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.108.35 user=root Jan 12 20:40:13 host sshd[14959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:40:14 host sshd[14959]: Failed password for invalid user root from 157.245.108.35 port 38824 ssh2 Jan 12 20:40:14 host sshd[14959]: Received disconnect from 157.245.108.35 port 38824:11: Bye Bye [preauth] Jan 12 20:40:14 host sshd[14959]: Disconnected from 157.245.108.35 port 38824 [preauth] Jan 12 20:40:40 host sshd[15008]: User root from 159.65.41.104 not allowed because not listed in AllowUsers Jan 12 20:40:40 host sshd[15008]: input_userauth_request: invalid user root [preauth] Jan 12 20:40:40 host unix_chkpwd[15011]: password check failed for user (root) Jan 12 20:40:40 host sshd[15008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.41.104 user=root Jan 12 20:40:40 host sshd[15008]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:40:42 host sshd[15008]: Failed password for invalid user root from 159.65.41.104 port 42372 ssh2 Jan 12 20:40:42 host sshd[15008]: Received disconnect from 159.65.41.104 port 42372:11: Bye Bye [preauth] Jan 12 20:40:42 host sshd[15008]: Disconnected from 159.65.41.104 port 42372 [preauth] Jan 12 20:41:38 host sshd[15156]: User root from 43.157.14.134 not allowed because not listed in AllowUsers Jan 12 20:41:38 host sshd[15156]: input_userauth_request: invalid user root [preauth] Jan 12 20:41:38 host unix_chkpwd[15161]: password check failed for user (root) Jan 12 20:41:38 host sshd[15156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.14.134 user=root Jan 12 20:41:38 host sshd[15156]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:41:40 host sshd[15156]: Failed password for invalid user root from 43.157.14.134 port 59750 ssh2 Jan 12 20:41:40 host sshd[15156]: Received disconnect from 43.157.14.134 port 59750:11: Bye Bye [preauth] Jan 12 20:41:40 host sshd[15156]: Disconnected from 43.157.14.134 port 59750 [preauth] Jan 12 20:42:05 host sshd[15239]: User root from 157.245.108.35 not allowed because not listed in AllowUsers Jan 12 20:42:05 host sshd[15239]: input_userauth_request: invalid user root [preauth] Jan 12 20:42:05 host unix_chkpwd[15241]: password check failed for user (root) Jan 12 20:42:05 host sshd[15239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.108.35 user=root Jan 12 20:42:05 host sshd[15239]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:42:06 host sshd[15239]: Failed password for invalid user root from 157.245.108.35 port 39790 ssh2 Jan 12 20:42:06 host sshd[15239]: Received disconnect from 157.245.108.35 port 39790:11: Bye Bye [preauth] Jan 12 20:42:06 host sshd[15239]: Disconnected from 157.245.108.35 port 39790 [preauth] Jan 12 20:44:37 host sshd[15638]: User root from 39.91.166.21 not allowed because not listed in AllowUsers Jan 12 20:44:37 host sshd[15638]: input_userauth_request: invalid user root [preauth] Jan 12 20:44:37 host unix_chkpwd[15642]: password check failed for user (root) Jan 12 20:44:37 host sshd[15638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.91.166.21 user=root Jan 12 20:44:37 host sshd[15638]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:44:39 host sshd[15638]: Failed password for invalid user root from 39.91.166.21 port 53462 ssh2 Jan 12 20:53:10 host sshd[16743]: Invalid user oracle from 73.64.204.116 port 51725 Jan 12 20:53:10 host sshd[16743]: input_userauth_request: invalid user oracle [preauth] Jan 12 20:53:10 host sshd[16743]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:53:10 host sshd[16743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.64.204.116 Jan 12 20:53:13 host sshd[16743]: Failed password for invalid user oracle from 73.64.204.116 port 51725 ssh2 Jan 12 20:53:13 host sshd[16743]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:53:15 host sshd[16743]: Failed password for invalid user oracle from 73.64.204.116 port 51725 ssh2 Jan 12 20:53:16 host sshd[16743]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:53:18 host sshd[16743]: Failed password for invalid user oracle from 73.64.204.116 port 51725 ssh2 Jan 12 20:53:19 host sshd[16743]: Failed password for invalid user oracle from 73.64.204.116 port 51725 ssh2 Jan 12 20:53:19 host sshd[16743]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:53:21 host sshd[16743]: Failed password for invalid user oracle from 73.64.204.116 port 51725 ssh2 Jan 12 20:53:23 host sshd[16743]: pam_unix(sshd:auth): check pass; user unknown Jan 12 20:53:25 host sshd[16743]: Failed password for invalid user oracle from 73.64.204.116 port 51725 ssh2 Jan 12 20:53:25 host sshd[16743]: error: maximum authentication attempts exceeded for invalid user oracle from 73.64.204.116 port 51725 ssh2 [preauth] Jan 12 20:53:25 host sshd[16743]: Disconnecting: Too many authentication failures [preauth] Jan 12 20:53:25 host sshd[16743]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.64.204.116 Jan 12 20:53:25 host sshd[16743]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 12 20:56:31 host sshd[17212]: User root from 181.165.121.81 not allowed because not listed in AllowUsers Jan 12 20:56:31 host sshd[17212]: input_userauth_request: invalid user root [preauth] Jan 12 20:56:31 host unix_chkpwd[17247]: password check failed for user (root) Jan 12 20:56:31 host sshd[17212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.165.121.81 user=root Jan 12 20:56:31 host sshd[17212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:56:32 host sshd[17212]: Failed password for invalid user root from 181.165.121.81 port 49453 ssh2 Jan 12 20:56:33 host unix_chkpwd[17250]: password check failed for user (root) Jan 12 20:56:33 host sshd[17212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:56:35 host sshd[17212]: Failed password for invalid user root from 181.165.121.81 port 49453 ssh2 Jan 12 20:56:39 host unix_chkpwd[17265]: password check failed for user (root) Jan 12 20:56:39 host sshd[17212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:56:41 host sshd[17212]: Failed password for invalid user root from 181.165.121.81 port 49453 ssh2 Jan 12 20:56:42 host unix_chkpwd[17268]: password check failed for user (root) Jan 12 20:56:42 host sshd[17212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 20:56:44 host sshd[17212]: Failed password for invalid user root from 181.165.121.81 port 49453 ssh2 Jan 12 21:06:30 host sshd[18618]: Invalid user admin from 50.79.164.74 port 43405 Jan 12 21:06:30 host sshd[18618]: input_userauth_request: invalid user admin [preauth] Jan 12 21:06:30 host sshd[18618]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:06:30 host sshd[18618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.79.164.74 Jan 12 21:06:32 host sshd[18618]: Failed password for invalid user admin from 50.79.164.74 port 43405 ssh2 Jan 12 21:06:36 host sshd[18618]: Failed password for invalid user admin from 50.79.164.74 port 43405 ssh2 Jan 12 21:06:37 host sshd[18618]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:06:39 host sshd[18618]: Failed password for invalid user admin from 50.79.164.74 port 43405 ssh2 Jan 12 21:06:41 host sshd[18618]: Connection reset by 50.79.164.74 port 43405 [preauth] Jan 12 21:06:41 host sshd[18618]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.79.164.74 Jan 12 21:09:16 host sshd[18977]: Invalid user username from 44.197.103.15 port 60642 Jan 12 21:09:16 host sshd[18977]: input_userauth_request: invalid user username [preauth] Jan 12 21:09:16 host sshd[18977]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:09:16 host sshd[18977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.197.103.15 Jan 12 21:09:18 host sshd[18977]: Failed password for invalid user username from 44.197.103.15 port 60642 ssh2 Jan 12 21:09:18 host sshd[18977]: Connection closed by 44.197.103.15 port 60642 [preauth] Jan 12 21:13:58 host sshd[19940]: Invalid user anonymous from 104.236.165.32 port 50485 Jan 12 21:13:58 host sshd[19940]: input_userauth_request: invalid user anonymous [preauth] Jan 12 21:13:58 host sshd[19940]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:13:58 host sshd[19940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.165.32 Jan 12 21:14:00 host sshd[19940]: Failed password for invalid user anonymous from 104.236.165.32 port 50485 ssh2 Jan 12 21:14:01 host sshd[19940]: Connection closed by 104.236.165.32 port 50485 [preauth] Jan 12 21:14:48 host sshd[20105]: Invalid user user from 112.187.58.65 port 59429 Jan 12 21:14:48 host sshd[20105]: input_userauth_request: invalid user user [preauth] Jan 12 21:14:48 host sshd[20105]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:14:48 host sshd[20105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.187.58.65 Jan 12 21:14:50 host sshd[20105]: Failed password for invalid user user from 112.187.58.65 port 59429 ssh2 Jan 12 21:14:51 host sshd[20105]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:14:53 host sshd[20105]: Failed password for invalid user user from 112.187.58.65 port 59429 ssh2 Jan 12 21:14:55 host sshd[20105]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:14:58 host sshd[20105]: Failed password for invalid user user from 112.187.58.65 port 59429 ssh2 Jan 12 21:14:59 host sshd[20105]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:15:01 host sshd[20105]: Failed password for invalid user user from 112.187.58.65 port 59429 ssh2 Jan 12 21:15:02 host sshd[20105]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:15:03 host sshd[20105]: Failed password for invalid user user from 112.187.58.65 port 59429 ssh2 Jan 12 21:15:05 host sshd[20105]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:15:07 host sshd[20105]: Failed password for invalid user user from 112.187.58.65 port 59429 ssh2 Jan 12 21:15:07 host sshd[20105]: error: maximum authentication attempts exceeded for invalid user user from 112.187.58.65 port 59429 ssh2 [preauth] Jan 12 21:15:07 host sshd[20105]: Disconnecting: Too many authentication failures [preauth] Jan 12 21:15:07 host sshd[20105]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.187.58.65 Jan 12 21:15:07 host sshd[20105]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 12 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 21:21:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IqoUZ5GHh0gRYrxU.~ Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IqoUZ5GHh0gRYrxU.~' Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IqoUZ5GHh0gRYrxU.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 21:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 21:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 21:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 21:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 21:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 21:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 21:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 21:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 21:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 21:32:00 host sshd[23501]: User root from 39.119.183.94 not allowed because not listed in AllowUsers Jan 12 21:32:00 host sshd[23501]: input_userauth_request: invalid user root [preauth] Jan 12 21:32:00 host unix_chkpwd[23505]: password check failed for user (root) Jan 12 21:32:00 host sshd[23501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.119.183.94 user=root Jan 12 21:32:00 host sshd[23501]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:32:02 host sshd[23501]: Failed password for invalid user root from 39.119.183.94 port 62277 ssh2 Jan 12 21:32:03 host unix_chkpwd[23520]: password check failed for user (root) Jan 12 21:32:03 host sshd[23501]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:32:05 host sshd[23501]: Failed password for invalid user root from 39.119.183.94 port 62277 ssh2 Jan 12 21:32:07 host unix_chkpwd[23527]: password check failed for user (root) Jan 12 21:32:07 host sshd[23501]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:32:08 host sshd[23501]: Failed password for invalid user root from 39.119.183.94 port 62277 ssh2 Jan 12 21:32:09 host unix_chkpwd[23532]: password check failed for user (root) Jan 12 21:32:09 host sshd[23501]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:32:11 host sshd[23501]: Failed password for invalid user root from 39.119.183.94 port 62277 ssh2 Jan 12 21:41:35 host sshd[25121]: Invalid user support from 179.70.78.106 port 38471 Jan 12 21:41:35 host sshd[25121]: input_userauth_request: invalid user support [preauth] Jan 12 21:41:35 host sshd[25121]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:41:35 host sshd[25121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.70.78.106 Jan 12 21:41:37 host sshd[25121]: Failed password for invalid user support from 179.70.78.106 port 38471 ssh2 Jan 12 21:41:38 host sshd[25121]: Connection reset by 179.70.78.106 port 38471 [preauth] Jan 12 21:44:59 host sshd[25684]: User root from 187.218.23.85 not allowed because not listed in AllowUsers Jan 12 21:44:59 host sshd[25684]: input_userauth_request: invalid user root [preauth] Jan 12 21:44:59 host unix_chkpwd[25689]: password check failed for user (root) Jan 12 21:44:59 host sshd[25684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.218.23.85 user=root Jan 12 21:44:59 host sshd[25684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:45:02 host sshd[25684]: Failed password for invalid user root from 187.218.23.85 port 57260 ssh2 Jan 12 21:45:02 host sshd[25684]: Received disconnect from 187.218.23.85 port 57260:11: Bye Bye [preauth] Jan 12 21:45:02 host sshd[25684]: Disconnected from 187.218.23.85 port 57260 [preauth] Jan 12 21:48:05 host sshd[26091]: Invalid user dc from 194.110.203.109 port 48298 Jan 12 21:48:05 host sshd[26091]: input_userauth_request: invalid user dc [preauth] Jan 12 21:48:05 host sshd[26091]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:48:05 host sshd[26091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 21:48:07 host sshd[26091]: Failed password for invalid user dc from 194.110.203.109 port 48298 ssh2 Jan 12 21:48:10 host sshd[26091]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:48:10 host sshd[26108]: User root from 128.199.57.142 not allowed because not listed in AllowUsers Jan 12 21:48:10 host sshd[26108]: input_userauth_request: invalid user root [preauth] Jan 12 21:48:10 host unix_chkpwd[26112]: password check failed for user (root) Jan 12 21:48:10 host sshd[26108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.57.142 user=root Jan 12 21:48:10 host sshd[26108]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:48:12 host sshd[26091]: Failed password for invalid user dc from 194.110.203.109 port 48298 ssh2 Jan 12 21:48:12 host sshd[26108]: Failed password for invalid user root from 128.199.57.142 port 60834 ssh2 Jan 12 21:48:12 host sshd[26108]: Received disconnect from 128.199.57.142 port 60834:11: Bye Bye [preauth] Jan 12 21:48:12 host sshd[26108]: Disconnected from 128.199.57.142 port 60834 [preauth] Jan 12 21:48:13 host sshd[26116]: User root from 189.222.6.107 not allowed because not listed in AllowUsers Jan 12 21:48:13 host sshd[26116]: input_userauth_request: invalid user root [preauth] Jan 12 21:48:14 host unix_chkpwd[26120]: password check failed for user (root) Jan 12 21:48:14 host sshd[26116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.222.6.107 user=root Jan 12 21:48:14 host sshd[26116]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:48:15 host sshd[26091]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:48:16 host sshd[26116]: Failed password for invalid user root from 189.222.6.107 port 61040 ssh2 Jan 12 21:48:17 host sshd[26116]: Received disconnect from 189.222.6.107 port 61040:11: Bye Bye [preauth] Jan 12 21:48:17 host sshd[26116]: Disconnected from 189.222.6.107 port 61040 [preauth] Jan 12 21:48:17 host sshd[26091]: Failed password for invalid user dc from 194.110.203.109 port 48298 ssh2 Jan 12 21:48:20 host sshd[26091]: Connection closed by 194.110.203.109 port 48298 [preauth] Jan 12 21:48:20 host sshd[26091]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 21:50:30 host sshd[26519]: User root from 187.218.23.85 not allowed because not listed in AllowUsers Jan 12 21:50:30 host sshd[26519]: input_userauth_request: invalid user root [preauth] Jan 12 21:50:30 host unix_chkpwd[26523]: password check failed for user (root) Jan 12 21:50:30 host sshd[26519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.218.23.85 user=root Jan 12 21:50:30 host sshd[26519]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:50:32 host sshd[26519]: Failed password for invalid user root from 187.218.23.85 port 49264 ssh2 Jan 12 21:52:15 host sshd[26727]: Connection closed by 189.222.6.107 port 1701 [preauth] Jan 12 21:52:16 host sshd[26737]: User root from 8.213.129.130 not allowed because not listed in AllowUsers Jan 12 21:52:16 host sshd[26737]: input_userauth_request: invalid user root [preauth] Jan 12 21:52:16 host unix_chkpwd[26742]: password check failed for user (root) Jan 12 21:52:16 host sshd[26737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.129.130 user=root Jan 12 21:52:16 host sshd[26737]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:52:18 host sshd[26737]: Failed password for invalid user root from 8.213.129.130 port 57102 ssh2 Jan 12 21:52:18 host sshd[26737]: Received disconnect from 8.213.129.130 port 57102:11: Bye Bye [preauth] Jan 12 21:52:18 host sshd[26737]: Disconnected from 8.213.129.130 port 57102 [preauth] Jan 12 21:54:11 host sshd[27008]: User root from 189.222.6.107 not allowed because not listed in AllowUsers Jan 12 21:54:11 host sshd[27008]: input_userauth_request: invalid user root [preauth] Jan 12 21:54:11 host unix_chkpwd[27015]: password check failed for user (root) Jan 12 21:54:11 host sshd[27008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.222.6.107 user=root Jan 12 21:54:11 host sshd[27008]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:54:13 host sshd[27008]: Failed password for invalid user root from 189.222.6.107 port 26738 ssh2 Jan 12 21:54:14 host sshd[27008]: Received disconnect from 189.222.6.107 port 26738:11: Bye Bye [preauth] Jan 12 21:54:14 host sshd[27008]: Disconnected from 189.222.6.107 port 26738 [preauth] Jan 12 21:57:05 host sshd[27492]: User root from 8.213.129.130 not allowed because not listed in AllowUsers Jan 12 21:57:05 host sshd[27492]: input_userauth_request: invalid user root [preauth] Jan 12 21:57:05 host unix_chkpwd[27509]: password check failed for user (root) Jan 12 21:57:05 host sshd[27492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.129.130 user=root Jan 12 21:57:05 host sshd[27492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:57:07 host sshd[27492]: Failed password for invalid user root from 8.213.129.130 port 37260 ssh2 Jan 12 21:59:50 host sshd[27888]: Did not receive identification string from 44.200.204.141 port 36472 Jan 12 21:59:54 host sshd[27897]: Invalid user admin from 44.200.204.141 port 36612 Jan 12 21:59:54 host sshd[27898]: Invalid user halo from 44.200.204.141 port 36792 Jan 12 21:59:54 host sshd[27897]: input_userauth_request: invalid user admin [preauth] Jan 12 21:59:54 host sshd[27898]: input_userauth_request: invalid user halo [preauth] Jan 12 21:59:54 host sshd[27899]: Invalid user vagrant from 44.200.204.141 port 36538 Jan 12 21:59:54 host sshd[27899]: input_userauth_request: invalid user vagrant [preauth] Jan 12 21:59:54 host sshd[27900]: Invalid user halo from 44.200.204.141 port 36616 Jan 12 21:59:54 host sshd[27900]: input_userauth_request: invalid user halo [preauth] Jan 12 21:59:54 host sshd[27903]: Invalid user user from 44.200.204.141 port 36762 Jan 12 21:59:54 host sshd[27903]: input_userauth_request: invalid user user [preauth] Jan 12 21:59:54 host sshd[27902]: User root from 44.200.204.141 not allowed because not listed in AllowUsers Jan 12 21:59:54 host sshd[27902]: input_userauth_request: invalid user root [preauth] Jan 12 21:59:54 host sshd[27908]: Invalid user hadoop from 44.200.204.141 port 36754 Jan 12 21:59:54 host sshd[27904]: User root from 44.200.204.141 not allowed because not listed in AllowUsers Jan 12 21:59:54 host sshd[27908]: input_userauth_request: invalid user hadoop [preauth] Jan 12 21:59:54 host sshd[27904]: input_userauth_request: invalid user root [preauth] Jan 12 21:59:54 host sshd[27907]: Invalid user ftpuser from 44.200.204.141 port 36628 Jan 12 21:59:54 host sshd[27907]: input_userauth_request: invalid user ftpuser [preauth] Jan 12 21:59:54 host sshd[27906]: Invalid user admin from 44.200.204.141 port 36598 Jan 12 21:59:54 host sshd[27906]: input_userauth_request: invalid user admin [preauth] Jan 12 21:59:54 host sshd[27909]: Invalid user oracle from 44.200.204.141 port 36486 Jan 12 21:59:54 host sshd[27909]: input_userauth_request: invalid user oracle [preauth] Jan 12 21:59:54 host sshd[27913]: User root from 44.200.204.141 not allowed because not listed in AllowUsers Jan 12 21:59:54 host sshd[27913]: input_userauth_request: invalid user root [preauth] Jan 12 21:59:54 host sshd[27910]: User root from 44.200.204.141 not allowed because not listed in AllowUsers Jan 12 21:59:54 host sshd[27910]: input_userauth_request: invalid user root [preauth] Jan 12 21:59:54 host sshd[27911]: Invalid user oracle from 44.200.204.141 port 36702 Jan 12 21:59:54 host sshd[27911]: input_userauth_request: invalid user oracle [preauth] Jan 12 21:59:54 host sshd[27914]: Invalid user es from 44.200.204.141 port 36652 Jan 12 21:59:54 host sshd[27914]: input_userauth_request: invalid user es [preauth] Jan 12 21:59:54 host sshd[27921]: Invalid user ftpuser from 44.200.204.141 port 36558 Jan 12 21:59:54 host sshd[27921]: input_userauth_request: invalid user ftpuser [preauth] Jan 12 21:59:54 host sshd[27915]: Invalid user postgres from 44.200.204.141 port 36690 Jan 12 21:59:54 host sshd[27915]: input_userauth_request: invalid user postgres [preauth] Jan 12 21:59:54 host sshd[27923]: Invalid user ftpuser from 44.200.204.141 port 36694 Jan 12 21:59:54 host sshd[27923]: input_userauth_request: invalid user ftpuser [preauth] Jan 12 21:59:54 host sshd[27916]: Invalid user ftpuser from 44.200.204.141 port 36664 Jan 12 21:59:54 host sshd[27916]: input_userauth_request: invalid user ftpuser [preauth] Jan 12 21:59:54 host sshd[27917]: Invalid user pi from 44.200.204.141 port 36582 Jan 12 21:59:54 host sshd[27917]: input_userauth_request: invalid user pi [preauth] Jan 12 21:59:54 host sshd[27924]: Invalid user ansadmin from 44.200.204.141 port 36672 Jan 12 21:59:54 host sshd[27924]: input_userauth_request: invalid user ansadmin [preauth] Jan 12 21:59:54 host sshd[27922]: Invalid user ubuntu from 44.200.204.141 port 36574 Jan 12 21:59:54 host sshd[27922]: input_userauth_request: invalid user ubuntu [preauth] Jan 12 21:59:54 host sshd[27920]: Invalid user pi from 44.200.204.141 port 36636 Jan 12 21:59:54 host sshd[27920]: input_userauth_request: invalid user pi [preauth] Jan 12 21:59:54 host sshd[27925]: Invalid user ansadmin from 44.200.204.141 port 36630 Jan 12 21:59:54 host sshd[27925]: input_userauth_request: invalid user ansadmin [preauth] Jan 12 21:59:54 host sshd[27931]: Invalid user user from 44.200.204.141 port 36548 Jan 12 21:59:54 host sshd[27931]: input_userauth_request: invalid user user [preauth] Jan 12 21:59:54 host sshd[27926]: User root from 44.200.204.141 not allowed because not listed in AllowUsers Jan 12 21:59:54 host sshd[27926]: input_userauth_request: invalid user root [preauth] Jan 12 21:59:54 host sshd[27928]: Invalid user oracle from 44.200.204.141 port 36638 Jan 12 21:59:54 host sshd[27928]: input_userauth_request: invalid user oracle [preauth] Jan 12 21:59:54 host sshd[27897]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:54 host sshd[27897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:54 host sshd[27898]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:54 host sshd[27898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:54 host sshd[27932]: Invalid user user from 44.200.204.141 port 36580 Jan 12 21:59:54 host sshd[27932]: input_userauth_request: invalid user user [preauth] Jan 12 21:59:54 host sshd[27899]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:54 host sshd[27899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:54 host sshd[27933]: User root from 44.200.204.141 not allowed because not listed in AllowUsers Jan 12 21:59:54 host sshd[27933]: input_userauth_request: invalid user root [preauth] Jan 12 21:59:54 host sshd[27900]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:54 host sshd[27900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:54 host sshd[27903]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:54 host sshd[27903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27908]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27907]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27906]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host unix_chkpwd[27956]: password check failed for user (root) Jan 12 21:59:55 host sshd[27902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 user=root Jan 12 21:59:55 host sshd[27902]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:59:55 host unix_chkpwd[27957]: password check failed for user (root) Jan 12 21:59:55 host sshd[27904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 user=root Jan 12 21:59:55 host sshd[27904]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:59:55 host sshd[27909]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27911]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host unix_chkpwd[27958]: password check failed for user (root) Jan 12 21:59:55 host sshd[27913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 user=root Jan 12 21:59:55 host sshd[27913]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:59:55 host unix_chkpwd[27959]: password check failed for user (root) Jan 12 21:59:55 host sshd[27910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 user=root Jan 12 21:59:55 host sshd[27910]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:59:55 host sshd[27914]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27921]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27915]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27916]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27923]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27917]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27924]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27922]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27920]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27925]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27931]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27928]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host sshd[27932]: pam_unix(sshd:auth): check pass; user unknown Jan 12 21:59:55 host sshd[27932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 Jan 12 21:59:55 host unix_chkpwd[27960]: password check failed for user (root) Jan 12 21:59:55 host sshd[27926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 user=root Jan 12 21:59:55 host sshd[27926]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:59:55 host unix_chkpwd[27961]: password check failed for user (root) Jan 12 21:59:55 host sshd[27933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.200.204.141 user=root Jan 12 21:59:55 host sshd[27933]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 21:59:56 host sshd[27897]: Failed password for invalid user admin from 44.200.204.141 port 36612 ssh2 Jan 12 21:59:56 host sshd[27898]: Failed password for invalid user halo from 44.200.204.141 port 36792 ssh2 Jan 12 21:59:56 host sshd[27899]: Failed password for invalid user vagrant from 44.200.204.141 port 36538 ssh2 Jan 12 21:59:56 host sshd[27900]: Failed password for invalid user halo from 44.200.204.141 port 36616 ssh2 Jan 12 21:59:56 host sshd[27903]: Failed password for invalid user user from 44.200.204.141 port 36762 ssh2 Jan 12 21:59:56 host sshd[27897]: Connection closed by 44.200.204.141 port 36612 [preauth] Jan 12 21:59:56 host sshd[27898]: Connection closed by 44.200.204.141 port 36792 [preauth] Jan 12 21:59:57 host sshd[27899]: Connection closed by 44.200.204.141 port 36538 [preauth] Jan 12 21:59:57 host sshd[27900]: Connection closed by 44.200.204.141 port 36616 [preauth] Jan 12 21:59:57 host sshd[27903]: Connection closed by 44.200.204.141 port 36762 [preauth] Jan 12 21:59:57 host sshd[27908]: Failed password for invalid user hadoop from 44.200.204.141 port 36754 ssh2 Jan 12 21:59:57 host sshd[27907]: Failed password for invalid user ftpuser from 44.200.204.141 port 36628 ssh2 Jan 12 21:59:57 host sshd[27906]: Failed password for invalid user admin from 44.200.204.141 port 36598 ssh2 Jan 12 21:59:57 host sshd[27902]: Failed password for invalid user root from 44.200.204.141 port 36808 ssh2 Jan 12 21:59:57 host sshd[27904]: Failed password for invalid user root from 44.200.204.141 port 36642 ssh2 Jan 12 21:59:57 host sshd[27909]: Failed password for invalid user oracle from 44.200.204.141 port 36486 ssh2 Jan 12 21:59:57 host sshd[27911]: Failed password for invalid user oracle from 44.200.204.141 port 36702 ssh2 Jan 12 21:59:57 host sshd[27913]: Failed password for invalid user root from 44.200.204.141 port 36518 ssh2 Jan 12 21:59:57 host sshd[27910]: Failed password for invalid user root from 44.200.204.141 port 36684 ssh2 Jan 12 21:59:57 host sshd[27914]: Failed password for invalid user es from 44.200.204.141 port 36652 ssh2 Jan 12 21:59:57 host sshd[27921]: Failed password for invalid user ftpuser from 44.200.204.141 port 36558 ssh2 Jan 12 21:59:57 host sshd[27915]: Failed password for invalid user postgres from 44.200.204.141 port 36690 ssh2 Jan 12 21:59:57 host sshd[27916]: Failed password for invalid user ftpuser from 44.200.204.141 port 36664 ssh2 Jan 12 21:59:57 host sshd[27923]: Failed password for invalid user ftpuser from 44.200.204.141 port 36694 ssh2 Jan 12 21:59:57 host sshd[27917]: Failed password for invalid user pi from 44.200.204.141 port 36582 ssh2 Jan 12 21:59:57 host sshd[27924]: Failed password for invalid user ansadmin from 44.200.204.141 port 36672 ssh2 Jan 12 21:59:57 host sshd[27922]: Failed password for invalid user ubuntu from 44.200.204.141 port 36574 ssh2 Jan 12 21:59:57 host sshd[27920]: Failed password for invalid user pi from 44.200.204.141 port 36636 ssh2 Jan 12 21:59:57 host sshd[27925]: Failed password for invalid user ansadmin from 44.200.204.141 port 36630 ssh2 Jan 12 21:59:57 host sshd[27931]: Failed password for invalid user user from 44.200.204.141 port 36548 ssh2 Jan 12 21:59:57 host sshd[27928]: Failed password for invalid user oracle from 44.200.204.141 port 36638 ssh2 Jan 12 21:59:57 host sshd[27932]: Failed password for invalid user user from 44.200.204.141 port 36580 ssh2 Jan 12 21:59:57 host sshd[27926]: Failed password for invalid user root from 44.200.204.141 port 36640 ssh2 Jan 12 21:59:57 host sshd[27933]: Failed password for invalid user root from 44.200.204.141 port 36496 ssh2 Jan 12 22:02:15 host sshd[28374]: Connection closed by 185.122.204.242 port 54658 [preauth] Jan 12 22:07:34 host sshd[29116]: Did not receive identification string from 49.233.48.98 port 48328 Jan 12 22:07:36 host sshd[29118]: Invalid user ubuntu from 49.233.48.98 port 53018 Jan 12 22:07:36 host sshd[29118]: input_userauth_request: invalid user ubuntu [preauth] Jan 12 22:07:36 host sshd[29117]: Invalid user test from 49.233.48.98 port 53020 Jan 12 22:07:36 host sshd[29117]: input_userauth_request: invalid user test [preauth] Jan 12 22:07:36 host sshd[29122]: User root from 49.233.48.98 not allowed because not listed in AllowUsers Jan 12 22:07:36 host sshd[29123]: Invalid user halo from 49.233.48.98 port 53032 Jan 12 22:07:36 host sshd[29122]: input_userauth_request: invalid user root [preauth] Jan 12 22:07:36 host sshd[29123]: input_userauth_request: invalid user halo [preauth] Jan 12 22:07:36 host sshd[29121]: Invalid user teamspeak from 49.233.48.98 port 53026 Jan 12 22:07:36 host sshd[29121]: input_userauth_request: invalid user teamspeak [preauth] Jan 12 22:07:36 host sshd[29130]: Invalid user user from 49.233.48.98 port 53052 Jan 12 22:07:36 host sshd[29130]: input_userauth_request: invalid user user [preauth] Jan 12 22:07:36 host sshd[29118]: pam_unix(sshd:auth): check pass; user unknown Jan 12 22:07:36 host sshd[29118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.48.98 Jan 12 22:07:36 host sshd[29117]: pam_unix(sshd:auth): check pass; user unknown Jan 12 22:07:36 host sshd[29117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.48.98 Jan 12 22:07:36 host sshd[29123]: pam_unix(sshd:auth): check pass; user unknown Jan 12 22:07:36 host sshd[29123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.48.98 Jan 12 22:07:36 host sshd[29121]: pam_unix(sshd:auth): check pass; user unknown Jan 12 22:07:36 host sshd[29121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.48.98 Jan 12 22:07:36 host sshd[29130]: pam_unix(sshd:auth): check pass; user unknown Jan 12 22:07:36 host sshd[29130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.48.98 Jan 12 22:07:36 host unix_chkpwd[29174]: password check failed for user (root) Jan 12 22:07:36 host sshd[29122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.48.98 user=root Jan 12 22:07:36 host sshd[29122]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 22:07:36 host sshd[29124]: User root from 49.233.48.98 not allowed because not listed in AllowUsers Jan 12 22:07:36 host sshd[29124]: input_userauth_request: invalid user root [preauth] Jan 12 22:07:36 host sshd[29127]: Invalid user user from 49.233.48.98 port 53010 Jan 12 22:07:36 host sshd[29127]: input_userauth_request: invalid user user [preauth] Jan 12 22:07:36 host sshd[29125]: Invalid user dev from 49.233.48.98 port 53062 Jan 12 22:07:36 host sshd[29125]: input_userauth_request: invalid user dev [preauth] Jan 12 22:07:36 host sshd[29133]: Invalid user test from 49.233.48.98 port 53056 Jan 12 22:07:36 host sshd[29133]: input_userauth_request: invalid user test [preauth] Jan 12 22:07:36 host sshd[29131]: Invalid user admin from 49.233.48.98 port 53046 Jan 12 22:07:36 host sshd[29131]: input_userauth_request: invalid user admin [preauth] Jan 12 22:07:37 host sshd[29151]: Invalid user ubnt from 49.233.48.98 port 52988 Jan 12 22:07:37 host sshd[29151]: input_userauth_request: invalid user ubnt [preauth] Jan 12 22:07:37 host sshd[29138]: User root from 49.233.48.98 not allowed because not listed in AllowUsers Jan 12 22:07:37 host sshd[29152]: Invalid user teamspeak from 49.233.48.98 port 53038 Jan 12 22:07:37 host sshd[29138]: input_userauth_request: invalid user root [preauth] Jan 12 22:07:37 host sshd[29152]: input_userauth_request: invalid user teamspeak [preauth] Jan 12 22:07:37 host sshd[29143]: Invalid user ansible from 49.233.48.98 port 52990 Jan 12 22:07:37 host sshd[29143]: input_userauth_request: invalid user ansible [preauth] Jan 12 22:07:37 host sshd[29119]: Invalid user admin from 49.233.48.98 port 53060 Jan 12 22:07:37 host sshd[29119]: input_userauth_request: invalid user admin [preauth] Jan 12 22:07:37 host sshd[29120]: Invalid user esuser from 49.233.48.98 port 53022 Jan 12 22:07:37 host sshd[29120]: input_userauth_request: invalid user esuser [preauth] Jan 12 22:07:37 host sshd[29127]: pam_unix(sshd:auth): check pass; user unknown Jan 12 22:07:37 host sshd[29127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.48.98 Jan 12 22:07:37 host unix_chkpwd[29189]: password check failed for user (root) Jan 12 22:07:37 host sshd[29124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.48.98 user=root Jan 12 22:07:37 host sshd[29124]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 22:07:37 host sshd[29125]: pam_unix(sshd:auth): check pass; user unknown Jan 12 22:07:37 host sshd[29125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.48.98 Jan 12 22:07:37 host sshd[29133]: pam_unix(sshd:auth): check pass; user unknown Jan 12 22:07:37 host sshd[29133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.48.98 Jan 12 22:07:37 host sshd[29126]: Invalid user pi from 49.233.48.98 port 52984 Jan 12 22:07:37 host sshd[29126]: input_userauth_request: invalid user pi [preauth] Jan 12 22:07:37 host sshd[29131]: pam_unix(sshd:auth): check pass; user unknown Jan 12 22:07:37 host sshd[29131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.48.98 Jan 12 22:07:38 host sshd[29118]: Failed password for invalid user ubuntu from 49.233.48.98 port 53018 ssh2 Jan 12 22:07:38 host sshd[29117]: Failed password for invalid user test from 49.233.48.98 port 53020 ssh2 Jan 12 22:07:38 host sshd[29123]: Failed password for invalid user halo from 49.233.48.98 port 53032 ssh2 Jan 12 22:07:38 host sshd[29121]: Failed password for invalid user teamspeak from 49.233.48.98 port 53026 ssh2 Jan 12 22:07:38 host sshd[29130]: Failed password for invalid user user from 49.233.48.98 port 53052 ssh2 Jan 12 22:07:38 host sshd[29122]: Failed password for invalid user root from 49.233.48.98 port 53040 ssh2 Jan 12 22:07:38 host sshd[29127]: Failed password for invalid user user from 49.233.48.98 port 53010 ssh2 Jan 12 22:07:38 host sshd[29124]: Failed password for invalid user root from 49.233.48.98 port 53024 ssh2 Jan 12 22:07:38 host sshd[29125]: Failed password for invalid user dev from 49.233.48.98 port 53062 ssh2 Jan 12 22:07:39 host sshd[29133]: Failed password for invalid user test from 49.233.48.98 port 53056 ssh2 Jan 12 22:07:39 host sshd[29131]: Failed password for invalid user admin from 49.233.48.98 port 53046 ssh2 Jan 12 22:12:42 host sshd[30020]: User ftp from 121.148.214.171 not allowed because not listed in AllowUsers Jan 12 22:12:42 host sshd[30020]: input_userauth_request: invalid user ftp [preauth] Jan 12 22:12:42 host unix_chkpwd[30025]: password check failed for user (ftp) Jan 12 22:12:42 host sshd[30020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.148.214.171 user=ftp Jan 12 22:12:42 host sshd[30020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 12 22:12:44 host sshd[30020]: Failed password for invalid user ftp from 121.148.214.171 port 63766 ssh2 Jan 12 22:12:45 host unix_chkpwd[30028]: password check failed for user (ftp) Jan 12 22:12:45 host sshd[30020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 12 22:12:47 host sshd[30020]: Failed password for invalid user ftp from 121.148.214.171 port 63766 ssh2 Jan 12 22:12:48 host sshd[30020]: Connection reset by 121.148.214.171 port 63766 [preauth] Jan 12 22:12:48 host sshd[30020]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.148.214.171 user=ftp Jan 12 22:13:31 host sshd[30134]: Connection reset by 175.210.168.38 port 63103 [preauth] Jan 12 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=wwwpmcresource user-7=dartsimp user-8=a2zgroup user-9=laundryboniface user-10=cochintaxi user-11=wwwkaretakers user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=wwwnexidigital user-17=mrsclean user-18=bonifacegroup user-19=wwwevmhonda user-20=straightcurve user-21=wwwletsstalkfood user-22=vfmassets user-23=wwwtestugo user-24=shalinijames user-25=pmcresources user-26=disposeat user-27=wwwkmaorg user-28=remysagr user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 22:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Nxb40NMvgwFvJZFe.~ Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Nxb40NMvgwFvJZFe.~' Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Nxb40NMvgwFvJZFe.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 22:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 22:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 22:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 22:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 22:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 22:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 22:29:48 host sshd[32725]: Invalid user hikvision from 79.190.149.172 port 43624 Jan 12 22:29:48 host sshd[32725]: input_userauth_request: invalid user hikvision [preauth] Jan 12 22:29:48 host sshd[32725]: pam_unix(sshd:auth): check pass; user unknown Jan 12 22:29:48 host sshd[32725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.190.149.172 Jan 12 22:29:50 host sshd[32725]: Failed password for invalid user hikvision from 79.190.149.172 port 43624 ssh2 Jan 12 22:29:51 host sshd[32725]: pam_unix(sshd:auth): check pass; user unknown Jan 12 22:29:54 host sshd[32725]: Failed password for invalid user hikvision from 79.190.149.172 port 43624 ssh2 Jan 12 22:29:54 host sshd[32725]: Failed password for invalid user hikvision from 79.190.149.172 port 43624 ssh2 Jan 12 22:29:54 host sshd[32725]: Connection closed by 79.190.149.172 port 43624 [preauth] Jan 12 22:29:54 host sshd[32725]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.190.149.172 Jan 12 22:41:57 host sshd[1968]: User root from 31.195.194.186 not allowed because not listed in AllowUsers Jan 12 22:41:57 host sshd[1968]: input_userauth_request: invalid user root [preauth] Jan 12 22:41:57 host unix_chkpwd[1974]: password check failed for user (root) Jan 12 22:41:57 host sshd[1968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.195.194.186 user=root Jan 12 22:41:57 host sshd[1968]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 22:41:59 host sshd[1968]: Failed password for invalid user root from 31.195.194.186 port 38043 ssh2 Jan 12 22:41:59 host sshd[1968]: Connection closed by 31.195.194.186 port 38043 [preauth] Jan 12 23:12:42 host sshd[6381]: Invalid user pi from 73.220.196.123 port 41404 Jan 12 23:12:42 host sshd[6381]: input_userauth_request: invalid user pi [preauth] Jan 12 23:12:42 host sshd[6383]: Invalid user pi from 73.220.196.123 port 41420 Jan 12 23:12:42 host sshd[6383]: input_userauth_request: invalid user pi [preauth] Jan 12 23:12:42 host sshd[6381]: pam_unix(sshd:auth): check pass; user unknown Jan 12 23:12:42 host sshd[6381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.220.196.123 Jan 12 23:12:42 host sshd[6383]: pam_unix(sshd:auth): check pass; user unknown Jan 12 23:12:42 host sshd[6383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.220.196.123 Jan 12 23:12:44 host sshd[6381]: Failed password for invalid user pi from 73.220.196.123 port 41404 ssh2 Jan 12 23:12:44 host sshd[6383]: Failed password for invalid user pi from 73.220.196.123 port 41420 ssh2 Jan 12 23:12:44 host sshd[6381]: Connection closed by 73.220.196.123 port 41404 [preauth] Jan 12 23:12:44 host sshd[6383]: Connection closed by 73.220.196.123 port 41420 [preauth] Jan 12 23:14:54 host sshd[6755]: Connection reset by 39.59.85.143 port 35501 [preauth] Jan 12 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 12 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=disposeat user-4=wwwkmaorg user-5=remysagr user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwnexidigital user-15=mrsclean user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 12 23:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-n4xXCJu3JTiN0ScZ.~ Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-n4xXCJu3JTiN0ScZ.~' Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-n4xXCJu3JTiN0ScZ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 12 23:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 12 23:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 12 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 12 23:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 12 23:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 12 23:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 12 23:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 12 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 12 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 12 23:32:38 host sshd[9592]: User root from 134.122.44.102 not allowed because not listed in AllowUsers Jan 12 23:32:38 host sshd[9592]: input_userauth_request: invalid user root [preauth] Jan 12 23:32:38 host unix_chkpwd[9595]: password check failed for user (root) Jan 12 23:32:38 host sshd[9592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.44.102 user=root Jan 12 23:32:38 host sshd[9592]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:32:41 host sshd[9592]: Failed password for invalid user root from 134.122.44.102 port 38254 ssh2 Jan 12 23:32:41 host sshd[9592]: Received disconnect from 134.122.44.102 port 38254:11: Bye Bye [preauth] Jan 12 23:32:41 host sshd[9592]: Disconnected from 134.122.44.102 port 38254 [preauth] Jan 12 23:33:22 host sshd[9670]: User root from 34.91.0.68 not allowed because not listed in AllowUsers Jan 12 23:33:22 host sshd[9670]: input_userauth_request: invalid user root [preauth] Jan 12 23:33:22 host unix_chkpwd[9673]: password check failed for user (root) Jan 12 23:33:22 host sshd[9670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.91.0.68 user=root Jan 12 23:33:22 host sshd[9670]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:33:24 host sshd[9670]: Failed password for invalid user root from 34.91.0.68 port 35874 ssh2 Jan 12 23:33:24 host sshd[9670]: Received disconnect from 34.91.0.68 port 35874:11: Bye Bye [preauth] Jan 12 23:33:24 host sshd[9670]: Disconnected from 34.91.0.68 port 35874 [preauth] Jan 12 23:33:54 host sshd[9738]: User root from 137.184.95.238 not allowed because not listed in AllowUsers Jan 12 23:33:54 host sshd[9738]: input_userauth_request: invalid user root [preauth] Jan 12 23:33:54 host unix_chkpwd[9743]: password check failed for user (root) Jan 12 23:33:54 host sshd[9738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.95.238 user=root Jan 12 23:33:54 host sshd[9738]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:33:56 host sshd[9738]: Failed password for invalid user root from 137.184.95.238 port 41204 ssh2 Jan 12 23:33:56 host sshd[9738]: Received disconnect from 137.184.95.238 port 41204:11: Bye Bye [preauth] Jan 12 23:33:56 host sshd[9738]: Disconnected from 137.184.95.238 port 41204 [preauth] Jan 12 23:34:53 host sshd[9851]: User root from 210.217.116.7 not allowed because not listed in AllowUsers Jan 12 23:34:53 host sshd[9851]: input_userauth_request: invalid user root [preauth] Jan 12 23:34:53 host unix_chkpwd[9855]: password check failed for user (root) Jan 12 23:34:53 host sshd[9851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.217.116.7 user=root Jan 12 23:34:53 host sshd[9851]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:34:55 host sshd[9851]: Failed password for invalid user root from 210.217.116.7 port 41228 ssh2 Jan 12 23:34:56 host unix_chkpwd[9863]: password check failed for user (root) Jan 12 23:34:56 host sshd[9851]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:34:58 host sshd[9851]: Failed password for invalid user root from 210.217.116.7 port 41228 ssh2 Jan 12 23:34:59 host unix_chkpwd[9866]: password check failed for user (root) Jan 12 23:34:59 host sshd[9851]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:35:01 host sshd[9851]: Failed password for invalid user root from 210.217.116.7 port 41228 ssh2 Jan 12 23:35:02 host unix_chkpwd[9902]: password check failed for user (root) Jan 12 23:35:02 host sshd[9851]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:35:04 host sshd[9851]: Failed password for invalid user root from 210.217.116.7 port 41228 ssh2 Jan 12 23:35:05 host unix_chkpwd[9912]: password check failed for user (root) Jan 12 23:35:05 host sshd[9851]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:35:07 host sshd[9851]: Failed password for invalid user root from 210.217.116.7 port 41228 ssh2 Jan 12 23:35:31 host sshd[10085]: User root from 207.246.80.195 not allowed because not listed in AllowUsers Jan 12 23:35:31 host sshd[10085]: input_userauth_request: invalid user root [preauth] Jan 12 23:35:31 host unix_chkpwd[10088]: password check failed for user (root) Jan 12 23:35:31 host sshd[10085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.246.80.195 user=root Jan 12 23:35:31 host sshd[10085]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:35:33 host sshd[10085]: Failed password for invalid user root from 207.246.80.195 port 51988 ssh2 Jan 12 23:35:33 host sshd[10085]: Received disconnect from 207.246.80.195 port 51988:11: Bye Bye [preauth] Jan 12 23:35:33 host sshd[10085]: Disconnected from 207.246.80.195 port 51988 [preauth] Jan 12 23:37:34 host sshd[10300]: Invalid user dd from 194.110.203.109 port 45424 Jan 12 23:37:34 host sshd[10300]: input_userauth_request: invalid user dd [preauth] Jan 12 23:37:34 host sshd[10300]: pam_unix(sshd:auth): check pass; user unknown Jan 12 23:37:34 host sshd[10300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 23:37:37 host sshd[10300]: Failed password for invalid user dd from 194.110.203.109 port 45424 ssh2 Jan 12 23:37:40 host sshd[10300]: pam_unix(sshd:auth): check pass; user unknown Jan 12 23:37:42 host sshd[10300]: Failed password for invalid user dd from 194.110.203.109 port 45424 ssh2 Jan 12 23:37:45 host sshd[10300]: pam_unix(sshd:auth): check pass; user unknown Jan 12 23:37:47 host sshd[10300]: Failed password for invalid user dd from 194.110.203.109 port 45424 ssh2 Jan 12 23:37:50 host sshd[10300]: Connection closed by 194.110.203.109 port 45424 [preauth] Jan 12 23:37:50 host sshd[10300]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 12 23:38:02 host sshd[10350]: User root from 207.246.80.195 not allowed because not listed in AllowUsers Jan 12 23:38:02 host sshd[10350]: input_userauth_request: invalid user root [preauth] Jan 12 23:38:02 host unix_chkpwd[10363]: password check failed for user (root) Jan 12 23:38:02 host sshd[10350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.246.80.195 user=root Jan 12 23:38:02 host sshd[10350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:38:04 host sshd[10350]: Failed password for invalid user root from 207.246.80.195 port 32862 ssh2 Jan 12 23:38:04 host sshd[10350]: Received disconnect from 207.246.80.195 port 32862:11: Bye Bye [preauth] Jan 12 23:38:04 host sshd[10350]: Disconnected from 207.246.80.195 port 32862 [preauth] Jan 12 23:38:24 host sshd[10417]: User root from 34.91.0.68 not allowed because not listed in AllowUsers Jan 12 23:38:24 host sshd[10417]: input_userauth_request: invalid user root [preauth] Jan 12 23:38:24 host unix_chkpwd[10421]: password check failed for user (root) Jan 12 23:38:24 host sshd[10417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.91.0.68 user=root Jan 12 23:38:24 host sshd[10417]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:38:27 host sshd[10417]: Failed password for invalid user root from 34.91.0.68 port 56856 ssh2 Jan 12 23:38:41 host sshd[10492]: User root from 137.184.95.238 not allowed because not listed in AllowUsers Jan 12 23:38:41 host sshd[10492]: input_userauth_request: invalid user root [preauth] Jan 12 23:38:41 host unix_chkpwd[10496]: password check failed for user (root) Jan 12 23:38:41 host sshd[10492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.95.238 user=root Jan 12 23:38:41 host sshd[10492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:38:43 host sshd[10492]: Failed password for invalid user root from 137.184.95.238 port 49694 ssh2 Jan 12 23:38:43 host sshd[10492]: Received disconnect from 137.184.95.238 port 49694:11: Bye Bye [preauth] Jan 12 23:38:43 host sshd[10492]: Disconnected from 137.184.95.238 port 49694 [preauth] Jan 12 23:39:37 host sshd[10654]: User root from 134.122.44.102 not allowed because not listed in AllowUsers Jan 12 23:39:37 host sshd[10654]: input_userauth_request: invalid user root [preauth] Jan 12 23:39:37 host unix_chkpwd[10657]: password check failed for user (root) Jan 12 23:39:37 host sshd[10654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.44.102 user=root Jan 12 23:39:37 host sshd[10654]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:39:40 host sshd[10654]: Failed password for invalid user root from 134.122.44.102 port 53126 ssh2 Jan 12 23:39:40 host sshd[10654]: Received disconnect from 134.122.44.102 port 53126:11: Bye Bye [preauth] Jan 12 23:39:40 host sshd[10654]: Disconnected from 134.122.44.102 port 53126 [preauth] Jan 12 23:42:31 host sshd[11170]: Connection reset by 211.250.232.17 port 44715 [preauth] Jan 12 23:43:36 host sshd[11290]: User root from 183.221.17.93 not allowed because not listed in AllowUsers Jan 12 23:43:36 host sshd[11290]: input_userauth_request: invalid user root [preauth] Jan 12 23:43:36 host unix_chkpwd[11296]: password check failed for user (root) Jan 12 23:43:36 host sshd[11290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.221.17.93 user=root Jan 12 23:43:36 host sshd[11290]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:43:38 host sshd[11290]: Failed password for invalid user root from 183.221.17.93 port 19374 ssh2 Jan 12 23:43:38 host sshd[11290]: Received disconnect from 183.221.17.93 port 19374:11: Bye Bye [preauth] Jan 12 23:43:38 host sshd[11290]: Disconnected from 183.221.17.93 port 19374 [preauth] Jan 12 23:45:10 host sshd[11471]: Invalid user craig from 107.189.30.59 port 42648 Jan 12 23:45:10 host sshd[11471]: input_userauth_request: invalid user craig [preauth] Jan 12 23:45:10 host sshd[11471]: pam_unix(sshd:auth): check pass; user unknown Jan 12 23:45:10 host sshd[11471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 12 23:45:12 host sshd[11471]: Failed password for invalid user craig from 107.189.30.59 port 42648 ssh2 Jan 12 23:45:13 host sshd[11471]: Connection closed by 107.189.30.59 port 42648 [preauth] Jan 12 23:46:18 host sshd[11703]: User root from 45.119.9.158 not allowed because not listed in AllowUsers Jan 12 23:46:18 host sshd[11703]: input_userauth_request: invalid user root [preauth] Jan 12 23:46:18 host unix_chkpwd[11709]: password check failed for user (root) Jan 12 23:46:18 host sshd[11703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.9.158 user=root Jan 12 23:46:18 host sshd[11703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:46:21 host sshd[11703]: Failed password for invalid user root from 45.119.9.158 port 41112 ssh2 Jan 12 23:46:21 host sshd[11703]: Received disconnect from 45.119.9.158 port 41112:11: Bye Bye [preauth] Jan 12 23:46:21 host sshd[11703]: Disconnected from 45.119.9.158 port 41112 [preauth] Jan 12 23:49:23 host sshd[12062]: User root from 45.119.9.158 not allowed because not listed in AllowUsers Jan 12 23:49:23 host sshd[12062]: input_userauth_request: invalid user root [preauth] Jan 12 23:49:23 host unix_chkpwd[12064]: password check failed for user (root) Jan 12 23:49:23 host sshd[12062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.9.158 user=root Jan 12 23:49:23 host sshd[12062]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:49:25 host sshd[12062]: Failed password for invalid user root from 45.119.9.158 port 54960 ssh2 Jan 12 23:49:25 host sshd[12062]: Received disconnect from 45.119.9.158 port 54960:11: Bye Bye [preauth] Jan 12 23:49:25 host sshd[12062]: Disconnected from 45.119.9.158 port 54960 [preauth] Jan 12 23:53:36 host sshd[12737]: Invalid user dlxuser from 42.119.27.132 port 43597 Jan 12 23:53:36 host sshd[12737]: input_userauth_request: invalid user dlxuser [preauth] Jan 12 23:53:36 host sshd[12737]: pam_unix(sshd:auth): check pass; user unknown Jan 12 23:53:36 host sshd[12737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.119.27.132 Jan 12 23:53:39 host sshd[12737]: Failed password for invalid user dlxuser from 42.119.27.132 port 43597 ssh2 Jan 12 23:53:40 host sshd[12737]: pam_unix(sshd:auth): check pass; user unknown Jan 12 23:53:42 host sshd[12737]: Failed password for invalid user dlxuser from 42.119.27.132 port 43597 ssh2 Jan 12 23:53:42 host sshd[12737]: Failed password for invalid user dlxuser from 42.119.27.132 port 43597 ssh2 Jan 12 23:53:42 host sshd[12737]: Connection reset by 42.119.27.132 port 43597 [preauth] Jan 12 23:53:42 host sshd[12737]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.119.27.132 Jan 12 23:55:34 host sshd[12989]: User root from 183.221.17.93 not allowed because not listed in AllowUsers Jan 12 23:55:34 host sshd[12989]: input_userauth_request: invalid user root [preauth] Jan 12 23:55:34 host unix_chkpwd[12993]: password check failed for user (root) Jan 12 23:55:34 host sshd[12989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.221.17.93 user=root Jan 12 23:55:34 host sshd[12989]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 12 23:55:36 host sshd[12989]: Failed password for invalid user root from 183.221.17.93 port 29002 ssh2 Jan 12 23:55:36 host sshd[12989]: Received disconnect from 183.221.17.93 port 29002:11: Bye Bye [preauth] Jan 12 23:55:36 host sshd[12989]: Disconnected from 183.221.17.93 port 29002 [preauth] Jan 13 00:06:49 host sshd[14597]: Invalid user admin from 210.104.220.115 port 54811 Jan 13 00:06:49 host sshd[14597]: input_userauth_request: invalid user admin [preauth] Jan 13 00:06:49 host sshd[14597]: pam_unix(sshd:auth): check pass; user unknown Jan 13 00:06:49 host sshd[14597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.104.220.115 Jan 13 00:06:51 host sshd[14597]: Failed password for invalid user admin from 210.104.220.115 port 54811 ssh2 Jan 13 00:06:52 host sshd[14597]: Failed password for invalid user admin from 210.104.220.115 port 54811 ssh2 Jan 13 00:06:53 host sshd[14597]: Connection reset by 210.104.220.115 port 54811 [preauth] Jan 13 00:12:15 host sshd[15344]: Connection closed by 172.105.128.13 port 6610 [preauth] Jan 13 00:12:17 host sshd[15348]: Did not receive identification string from 172.105.128.13 port 6618 Jan 13 00:12:20 host sshd[15350]: Connection closed by 172.105.128.13 port 4174 [preauth] Jan 13 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 00:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=palco123 user-22=gifterman user-23=kottayamcalldriv user-24=phmetals user-25=mrsclean user-26=wwwnexidigital user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 00:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x7sEo4rFizmtymSH.~ Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x7sEo4rFizmtymSH.~' Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-x7sEo4rFizmtymSH.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 00:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 00:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 00:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 00:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 00:23:36 host sshd[18161]: User root from 141.95.225.61 not allowed because not listed in AllowUsers Jan 13 00:23:36 host sshd[18161]: input_userauth_request: invalid user root [preauth] Jan 13 00:23:36 host unix_chkpwd[18164]: password check failed for user (root) Jan 13 00:23:36 host sshd[18161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.95.225.61 user=root Jan 13 00:23:36 host sshd[18161]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:23:38 host sshd[18161]: Failed password for invalid user root from 141.95.225.61 port 59588 ssh2 Jan 13 00:23:38 host sshd[18161]: Received disconnect from 141.95.225.61 port 59588:11: Bye Bye [preauth] Jan 13 00:23:38 host sshd[18161]: Disconnected from 141.95.225.61 port 59588 [preauth] Jan 13 00:24:28 host sshd[18243]: User root from 189.183.16.224 not allowed because not listed in AllowUsers Jan 13 00:24:28 host sshd[18243]: input_userauth_request: invalid user root [preauth] Jan 13 00:24:28 host unix_chkpwd[18270]: password check failed for user (root) Jan 13 00:24:28 host sshd[18243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.183.16.224 user=root Jan 13 00:24:28 host sshd[18243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:24:30 host sshd[18243]: Failed password for invalid user root from 189.183.16.224 port 36804 ssh2 Jan 13 00:24:31 host sshd[18243]: Received disconnect from 189.183.16.224 port 36804:11: Bye Bye [preauth] Jan 13 00:24:31 host sshd[18243]: Disconnected from 189.183.16.224 port 36804 [preauth] Jan 13 00:24:37 host sshd[18304]: User root from 121.190.54.53 not allowed because not listed in AllowUsers Jan 13 00:24:37 host sshd[18304]: input_userauth_request: invalid user root [preauth] Jan 13 00:24:37 host unix_chkpwd[18311]: password check failed for user (root) Jan 13 00:24:37 host sshd[18304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.190.54.53 user=root Jan 13 00:24:37 host sshd[18304]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:24:39 host sshd[18304]: Failed password for invalid user root from 121.190.54.53 port 59889 ssh2 Jan 13 00:24:40 host sshd[18304]: Connection reset by 121.190.54.53 port 59889 [preauth] Jan 13 00:24:40 host sshd[18318]: User root from 118.70.74.172 not allowed because not listed in AllowUsers Jan 13 00:24:40 host sshd[18318]: input_userauth_request: invalid user root [preauth] Jan 13 00:24:40 host unix_chkpwd[18322]: password check failed for user (root) Jan 13 00:24:40 host sshd[18318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.74.172 user=root Jan 13 00:24:40 host sshd[18318]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:24:43 host sshd[18318]: Failed password for invalid user root from 118.70.74.172 port 50866 ssh2 Jan 13 00:24:43 host sshd[18318]: Received disconnect from 118.70.74.172 port 50866:11: Bye Bye [preauth] Jan 13 00:24:43 host sshd[18318]: Disconnected from 118.70.74.172 port 50866 [preauth] Jan 13 00:26:09 host sshd[18642]: User root from 152.67.254.42 not allowed because not listed in AllowUsers Jan 13 00:26:09 host sshd[18642]: input_userauth_request: invalid user root [preauth] Jan 13 00:26:09 host unix_chkpwd[18645]: password check failed for user (root) Jan 13 00:26:09 host sshd[18642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.254.42 user=root Jan 13 00:26:09 host sshd[18642]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:26:10 host sshd[18642]: Failed password for invalid user root from 152.67.254.42 port 32868 ssh2 Jan 13 00:26:10 host sshd[18642]: Received disconnect from 152.67.254.42 port 32868:11: Bye Bye [preauth] Jan 13 00:26:10 host sshd[18642]: Disconnected from 152.67.254.42 port 32868 [preauth] Jan 13 00:26:24 host sshd[18663]: User root from 92.205.40.159 not allowed because not listed in AllowUsers Jan 13 00:26:24 host sshd[18663]: input_userauth_request: invalid user root [preauth] Jan 13 00:26:24 host unix_chkpwd[18668]: password check failed for user (root) Jan 13 00:26:24 host sshd[18663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.205.40.159 user=root Jan 13 00:26:24 host sshd[18663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:26:27 host sshd[18663]: Failed password for invalid user root from 92.205.40.159 port 57888 ssh2 Jan 13 00:26:27 host sshd[18663]: Received disconnect from 92.205.40.159 port 57888:11: Bye Bye [preauth] Jan 13 00:26:27 host sshd[18663]: Disconnected from 92.205.40.159 port 57888 [preauth] Jan 13 00:27:20 host sshd[18763]: User root from 200.195.169.59 not allowed because not listed in AllowUsers Jan 13 00:27:20 host sshd[18763]: input_userauth_request: invalid user root [preauth] Jan 13 00:27:20 host unix_chkpwd[18766]: password check failed for user (root) Jan 13 00:27:20 host sshd[18763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.195.169.59 user=root Jan 13 00:27:20 host sshd[18763]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:27:22 host sshd[18763]: Failed password for invalid user root from 200.195.169.59 port 42910 ssh2 Jan 13 00:27:22 host sshd[18763]: Received disconnect from 200.195.169.59 port 42910:11: Bye Bye [preauth] Jan 13 00:27:22 host sshd[18763]: Disconnected from 200.195.169.59 port 42910 [preauth] Jan 13 00:30:17 host sshd[19155]: User root from 189.183.16.224 not allowed because not listed in AllowUsers Jan 13 00:30:17 host sshd[19155]: input_userauth_request: invalid user root [preauth] Jan 13 00:30:17 host unix_chkpwd[19158]: password check failed for user (root) Jan 13 00:30:17 host sshd[19155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.183.16.224 user=root Jan 13 00:30:17 host sshd[19155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:30:18 host sshd[19155]: Failed password for invalid user root from 189.183.16.224 port 37188 ssh2 Jan 13 00:30:19 host sshd[19155]: Received disconnect from 189.183.16.224 port 37188:11: Bye Bye [preauth] Jan 13 00:30:19 host sshd[19155]: Disconnected from 189.183.16.224 port 37188 [preauth] Jan 13 00:30:54 host sshd[19357]: User root from 92.205.40.159 not allowed because not listed in AllowUsers Jan 13 00:30:54 host sshd[19357]: input_userauth_request: invalid user root [preauth] Jan 13 00:30:54 host unix_chkpwd[19360]: password check failed for user (root) Jan 13 00:30:54 host sshd[19357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.205.40.159 user=root Jan 13 00:30:54 host sshd[19357]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:30:56 host sshd[19357]: Failed password for invalid user root from 92.205.40.159 port 47656 ssh2 Jan 13 00:31:03 host sshd[19411]: User root from 141.95.225.61 not allowed because not listed in AllowUsers Jan 13 00:31:03 host sshd[19411]: input_userauth_request: invalid user root [preauth] Jan 13 00:31:03 host unix_chkpwd[19414]: password check failed for user (root) Jan 13 00:31:03 host sshd[19411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.95.225.61 user=root Jan 13 00:31:03 host sshd[19411]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:31:05 host sshd[19411]: Failed password for invalid user root from 141.95.225.61 port 40456 ssh2 Jan 13 00:31:35 host sshd[19483]: User root from 118.70.74.172 not allowed because not listed in AllowUsers Jan 13 00:31:35 host sshd[19483]: input_userauth_request: invalid user root [preauth] Jan 13 00:31:35 host unix_chkpwd[19511]: password check failed for user (root) Jan 13 00:31:35 host sshd[19483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.74.172 user=root Jan 13 00:31:35 host sshd[19483]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:31:37 host sshd[19483]: Failed password for invalid user root from 118.70.74.172 port 49706 ssh2 Jan 13 00:31:37 host sshd[19483]: Received disconnect from 118.70.74.172 port 49706:11: Bye Bye [preauth] Jan 13 00:31:37 host sshd[19483]: Disconnected from 118.70.74.172 port 49706 [preauth] Jan 13 00:32:00 host sshd[19567]: User root from 200.195.169.59 not allowed because not listed in AllowUsers Jan 13 00:32:00 host sshd[19567]: input_userauth_request: invalid user root [preauth] Jan 13 00:32:00 host unix_chkpwd[19570]: password check failed for user (root) Jan 13 00:32:00 host sshd[19567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.195.169.59 user=root Jan 13 00:32:00 host sshd[19567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:32:01 host sshd[19567]: Failed password for invalid user root from 200.195.169.59 port 34802 ssh2 Jan 13 00:32:02 host sshd[19567]: Received disconnect from 200.195.169.59 port 34802:11: Bye Bye [preauth] Jan 13 00:32:02 host sshd[19567]: Disconnected from 200.195.169.59 port 34802 [preauth] Jan 13 00:33:13 host sshd[19726]: User root from 152.67.254.42 not allowed because not listed in AllowUsers Jan 13 00:33:13 host sshd[19726]: input_userauth_request: invalid user root [preauth] Jan 13 00:33:13 host unix_chkpwd[19729]: password check failed for user (root) Jan 13 00:33:13 host sshd[19726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.254.42 user=root Jan 13 00:33:13 host sshd[19726]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:33:15 host sshd[19726]: Failed password for invalid user root from 152.67.254.42 port 59570 ssh2 Jan 13 00:38:27 host sshd[20478]: User root from 190.145.123.26 not allowed because not listed in AllowUsers Jan 13 00:38:27 host sshd[20478]: input_userauth_request: invalid user root [preauth] Jan 13 00:38:27 host unix_chkpwd[20482]: password check failed for user (root) Jan 13 00:38:27 host sshd[20478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.123.26 user=root Jan 13 00:38:27 host sshd[20478]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:38:29 host sshd[20478]: Failed password for invalid user root from 190.145.123.26 port 55388 ssh2 Jan 13 00:38:30 host sshd[20478]: Received disconnect from 190.145.123.26 port 55388:11: Bye Bye [preauth] Jan 13 00:38:30 host sshd[20478]: Disconnected from 190.145.123.26 port 55388 [preauth] Jan 13 00:39:46 host sshd[20714]: Invalid user pi from 122.116.33.170 port 40826 Jan 13 00:39:46 host sshd[20714]: input_userauth_request: invalid user pi [preauth] Jan 13 00:39:46 host sshd[20714]: pam_unix(sshd:auth): check pass; user unknown Jan 13 00:39:46 host sshd[20714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.33.170 Jan 13 00:39:47 host sshd[20714]: Failed password for invalid user pi from 122.116.33.170 port 40826 ssh2 Jan 13 00:39:48 host sshd[20714]: pam_unix(sshd:auth): check pass; user unknown Jan 13 00:39:50 host sshd[20714]: Failed password for invalid user pi from 122.116.33.170 port 40826 ssh2 Jan 13 00:39:51 host sshd[20714]: Connection reset by 122.116.33.170 port 40826 [preauth] Jan 13 00:39:51 host sshd[20714]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.33.170 Jan 13 00:42:30 host sshd[21136]: User root from 190.145.123.26 not allowed because not listed in AllowUsers Jan 13 00:42:30 host sshd[21136]: input_userauth_request: invalid user root [preauth] Jan 13 00:42:30 host unix_chkpwd[21162]: password check failed for user (root) Jan 13 00:42:30 host sshd[21136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.123.26 user=root Jan 13 00:42:30 host sshd[21136]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:42:32 host sshd[21136]: Failed password for invalid user root from 190.145.123.26 port 36170 ssh2 Jan 13 00:42:32 host sshd[21136]: Received disconnect from 190.145.123.26 port 36170:11: Bye Bye [preauth] Jan 13 00:42:32 host sshd[21136]: Disconnected from 190.145.123.26 port 36170 [preauth] Jan 13 00:42:49 host sshd[21216]: Invalid user ec2-user from 14.43.160.84 port 62137 Jan 13 00:42:49 host sshd[21216]: input_userauth_request: invalid user ec2-user [preauth] Jan 13 00:42:49 host sshd[21216]: pam_unix(sshd:auth): check pass; user unknown Jan 13 00:42:49 host sshd[21216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.43.160.84 Jan 13 00:42:52 host sshd[21216]: Failed password for invalid user ec2-user from 14.43.160.84 port 62137 ssh2 Jan 13 00:42:52 host sshd[21216]: pam_unix(sshd:auth): check pass; user unknown Jan 13 00:42:54 host sshd[21216]: Failed password for invalid user ec2-user from 14.43.160.84 port 62137 ssh2 Jan 13 00:42:55 host sshd[21216]: pam_unix(sshd:auth): check pass; user unknown Jan 13 00:42:57 host sshd[21216]: Failed password for invalid user ec2-user from 14.43.160.84 port 62137 ssh2 Jan 13 00:42:58 host sshd[21216]: Failed password for invalid user ec2-user from 14.43.160.84 port 62137 ssh2 Jan 13 00:42:59 host sshd[21216]: pam_unix(sshd:auth): check pass; user unknown Jan 13 00:43:01 host sshd[21216]: Failed password for invalid user ec2-user from 14.43.160.84 port 62137 ssh2 Jan 13 00:46:07 host sshd[21713]: User root from 220.141.24.38 not allowed because not listed in AllowUsers Jan 13 00:46:07 host sshd[21713]: input_userauth_request: invalid user root [preauth] Jan 13 00:46:07 host unix_chkpwd[21764]: password check failed for user (root) Jan 13 00:46:07 host sshd[21713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.141.24.38 user=root Jan 13 00:46:07 host sshd[21713]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:46:09 host sshd[21713]: Failed password for invalid user root from 220.141.24.38 port 39841 ssh2 Jan 13 00:46:11 host unix_chkpwd[21769]: password check failed for user (root) Jan 13 00:46:11 host sshd[21713]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:46:13 host sshd[21713]: Failed password for invalid user root from 220.141.24.38 port 39841 ssh2 Jan 13 00:46:13 host sshd[21713]: Connection reset by 220.141.24.38 port 39841 [preauth] Jan 13 00:46:13 host sshd[21713]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.141.24.38 user=root Jan 13 00:48:41 host sshd[22037]: Invalid user admin from 171.225.184.74 port 59609 Jan 13 00:48:41 host sshd[22037]: input_userauth_request: invalid user admin [preauth] Jan 13 00:48:43 host sshd[22037]: pam_unix(sshd:auth): check pass; user unknown Jan 13 00:48:43 host sshd[22037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.225.184.74 Jan 13 00:48:45 host sshd[22037]: Failed password for invalid user admin from 171.225.184.74 port 59609 ssh2 Jan 13 00:48:45 host sshd[22037]: Connection closed by 171.225.184.74 port 59609 [preauth] Jan 13 00:49:15 host sshd[22104]: User ftp from 171.225.184.74 not allowed because not listed in AllowUsers Jan 13 00:49:15 host sshd[22104]: input_userauth_request: invalid user ftp [preauth] Jan 13 00:49:16 host unix_chkpwd[22107]: password check failed for user (ftp) Jan 13 00:49:16 host sshd[22104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.225.184.74 user=ftp Jan 13 00:49:16 host sshd[22104]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 13 00:49:18 host sshd[22104]: Failed password for invalid user ftp from 171.225.184.74 port 17688 ssh2 Jan 13 00:49:19 host sshd[22111]: User root from 171.225.184.74 not allowed because not listed in AllowUsers Jan 13 00:49:19 host sshd[22111]: input_userauth_request: invalid user root [preauth] Jan 13 00:49:19 host unix_chkpwd[22114]: password check failed for user (root) Jan 13 00:49:19 host sshd[22111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.225.184.74 user=root Jan 13 00:49:19 host sshd[22111]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 00:49:19 host sshd[22104]: Connection closed by 171.225.184.74 port 17688 [preauth] Jan 13 00:49:21 host sshd[22111]: Failed password for invalid user root from 171.225.184.74 port 53639 ssh2 Jan 13 01:00:07 host sshd[23692]: User root from 128.199.22.245 not allowed because not listed in AllowUsers Jan 13 01:00:07 host sshd[23692]: input_userauth_request: invalid user root [preauth] Jan 13 01:00:07 host unix_chkpwd[23695]: password check failed for user (root) Jan 13 01:00:07 host sshd[23692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.22.245 user=root Jan 13 01:00:07 host sshd[23692]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 01:00:08 host sshd[23692]: Failed password for invalid user root from 128.199.22.245 port 36110 ssh2 Jan 13 01:00:09 host sshd[23692]: Received disconnect from 128.199.22.245 port 36110:11: Bye Bye [preauth] Jan 13 01:00:09 host sshd[23692]: Disconnected from 128.199.22.245 port 36110 [preauth] Jan 13 01:02:02 host sshd[23934]: User root from 206.189.89.23 not allowed because not listed in AllowUsers Jan 13 01:02:02 host sshd[23934]: input_userauth_request: invalid user root [preauth] Jan 13 01:02:02 host unix_chkpwd[23937]: password check failed for user (root) Jan 13 01:02:02 host sshd[23934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.89.23 user=root Jan 13 01:02:02 host sshd[23934]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 01:02:03 host sshd[23934]: Failed password for invalid user root from 206.189.89.23 port 44362 ssh2 Jan 13 01:02:03 host sshd[23934]: Received disconnect from 206.189.89.23 port 44362:11: Bye Bye [preauth] Jan 13 01:02:03 host sshd[23934]: Disconnected from 206.189.89.23 port 44362 [preauth] Jan 13 01:02:39 host sshd[24131]: User root from 154.221.17.241 not allowed because not listed in AllowUsers Jan 13 01:02:39 host sshd[24131]: input_userauth_request: invalid user root [preauth] Jan 13 01:02:39 host unix_chkpwd[24134]: password check failed for user (root) Jan 13 01:02:39 host sshd[24131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.17.241 user=root Jan 13 01:02:39 host sshd[24131]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 01:02:41 host sshd[24131]: Failed password for invalid user root from 154.221.17.241 port 55716 ssh2 Jan 13 01:02:42 host sshd[24131]: Received disconnect from 154.221.17.241 port 55716:11: Bye Bye [preauth] Jan 13 01:02:42 host sshd[24131]: Disconnected from 154.221.17.241 port 55716 [preauth] Jan 13 01:05:38 host sshd[24517]: User root from 137.63.147.2 not allowed because not listed in AllowUsers Jan 13 01:05:38 host sshd[24517]: input_userauth_request: invalid user root [preauth] Jan 13 01:05:38 host unix_chkpwd[24520]: password check failed for user (root) Jan 13 01:05:38 host sshd[24517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.147.2 user=root Jan 13 01:05:38 host sshd[24517]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 01:05:40 host sshd[24517]: Failed password for invalid user root from 137.63.147.2 port 41706 ssh2 Jan 13 01:05:40 host sshd[24517]: Received disconnect from 137.63.147.2 port 41706:11: Bye Bye [preauth] Jan 13 01:05:40 host sshd[24517]: Disconnected from 137.63.147.2 port 41706 [preauth] Jan 13 01:06:54 host sshd[24657]: User root from 128.199.22.245 not allowed because not listed in AllowUsers Jan 13 01:06:54 host sshd[24657]: input_userauth_request: invalid user root [preauth] Jan 13 01:06:54 host unix_chkpwd[24659]: password check failed for user (root) Jan 13 01:06:54 host sshd[24657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.22.245 user=root Jan 13 01:06:54 host sshd[24657]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 01:06:56 host sshd[24657]: Failed password for invalid user root from 128.199.22.245 port 36380 ssh2 Jan 13 01:07:10 host sshd[24722]: User root from 154.221.17.241 not allowed because not listed in AllowUsers Jan 13 01:07:10 host sshd[24722]: input_userauth_request: invalid user root [preauth] Jan 13 01:07:10 host unix_chkpwd[24727]: password check failed for user (root) Jan 13 01:07:10 host sshd[24722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.17.241 user=root Jan 13 01:07:10 host sshd[24722]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 01:07:11 host sshd[24729]: User root from 206.189.89.23 not allowed because not listed in AllowUsers Jan 13 01:07:11 host sshd[24729]: input_userauth_request: invalid user root [preauth] Jan 13 01:07:11 host unix_chkpwd[24731]: password check failed for user (root) Jan 13 01:07:11 host sshd[24729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.89.23 user=root Jan 13 01:07:11 host sshd[24729]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 01:07:12 host sshd[24722]: Failed password for invalid user root from 154.221.17.241 port 43538 ssh2 Jan 13 01:07:12 host sshd[24722]: Received disconnect from 154.221.17.241 port 43538:11: Bye Bye [preauth] Jan 13 01:07:12 host sshd[24722]: Disconnected from 154.221.17.241 port 43538 [preauth] Jan 13 01:07:13 host sshd[24729]: Failed password for invalid user root from 206.189.89.23 port 60766 ssh2 Jan 13 01:07:13 host sshd[24729]: Received disconnect from 206.189.89.23 port 60766:11: Bye Bye [preauth] Jan 13 01:07:13 host sshd[24729]: Disconnected from 206.189.89.23 port 60766 [preauth] Jan 13 01:07:36 host sshd[24948]: User root from 137.63.147.2 not allowed because not listed in AllowUsers Jan 13 01:07:36 host sshd[24948]: input_userauth_request: invalid user root [preauth] Jan 13 01:07:36 host unix_chkpwd[24954]: password check failed for user (root) Jan 13 01:07:36 host sshd[24948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.147.2 user=root Jan 13 01:07:36 host sshd[24948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 01:07:38 host sshd[24948]: Failed password for invalid user root from 137.63.147.2 port 42560 ssh2 Jan 13 01:07:39 host sshd[24948]: Received disconnect from 137.63.147.2 port 42560:11: Bye Bye [preauth] Jan 13 01:07:39 host sshd[24948]: Disconnected from 137.63.147.2 port 42560 [preauth] Jan 13 01:09:12 host sshd[25179]: Invalid user pi from 211.248.86.145 port 62770 Jan 13 01:09:12 host sshd[25179]: input_userauth_request: invalid user pi [preauth] Jan 13 01:09:12 host sshd[25179]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:09:12 host sshd[25179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.248.86.145 Jan 13 01:09:14 host sshd[25179]: Failed password for invalid user pi from 211.248.86.145 port 62770 ssh2 Jan 13 01:09:15 host sshd[25179]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:09:16 host sshd[25179]: Failed password for invalid user pi from 211.248.86.145 port 62770 ssh2 Jan 13 01:09:17 host sshd[25179]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:09:19 host sshd[25179]: Failed password for invalid user pi from 211.248.86.145 port 62770 ssh2 Jan 13 01:09:19 host sshd[25179]: Connection reset by 211.248.86.145 port 62770 [preauth] Jan 13 01:09:19 host sshd[25179]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.248.86.145 Jan 13 01:11:29 host sshd[25475]: Invalid user vadmin from 175.208.161.242 port 35851 Jan 13 01:11:29 host sshd[25475]: input_userauth_request: invalid user vadmin [preauth] Jan 13 01:11:29 host sshd[25475]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:11:29 host sshd[25475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.208.161.242 Jan 13 01:11:31 host sshd[25475]: Failed password for invalid user vadmin from 175.208.161.242 port 35851 ssh2 Jan 13 01:11:31 host sshd[25475]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:11:34 host sshd[25475]: Failed password for invalid user vadmin from 175.208.161.242 port 35851 ssh2 Jan 13 01:11:34 host sshd[25475]: Connection reset by 175.208.161.242 port 35851 [preauth] Jan 13 01:11:34 host sshd[25475]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.208.161.242 Jan 13 01:12:05 host sshd[25597]: User root from 60.241.101.35 not allowed because not listed in AllowUsers Jan 13 01:12:05 host sshd[25597]: input_userauth_request: invalid user root [preauth] Jan 13 01:12:05 host unix_chkpwd[25601]: password check failed for user (root) Jan 13 01:12:05 host sshd[25597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.241.101.35 user=root Jan 13 01:12:05 host sshd[25597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 01:12:07 host sshd[25597]: Failed password for invalid user root from 60.241.101.35 port 60913 ssh2 Jan 13 01:12:08 host unix_chkpwd[25615]: password check failed for user (root) Jan 13 01:12:08 host sshd[25597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 01:12:10 host sshd[25597]: Failed password for invalid user root from 60.241.101.35 port 60913 ssh2 Jan 13 01:12:11 host unix_chkpwd[25620]: password check failed for user (root) Jan 13 01:12:11 host sshd[25597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 01:12:14 host sshd[25597]: Failed password for invalid user root from 60.241.101.35 port 60913 ssh2 Jan 13 01:12:14 host sshd[25597]: Connection reset by 60.241.101.35 port 60913 [preauth] Jan 13 01:12:14 host sshd[25597]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.241.101.35 user=root Jan 13 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=ugotscom user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=cochintaxi user-11=wwwkaretakers user-12=palco123 user-13=gifterman user-14=kottayamcalldriv user-15=phmetals user-16=wwwnexidigital user-17=mrsclean user-18=bonifacegroup user-19=wwwevmhonda user-20=straightcurve user-21=wwwletsstalkfood user-22=vfmassets user-23=shalinijames user-24=wwwtestugo user-25=pmcresources user-26=disposeat user-27=wwwkmaorg user-28=remysagr user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 01:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cyx98jIehzsDGtcE.~ Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cyx98jIehzsDGtcE.~' Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cyx98jIehzsDGtcE.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 01:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 01:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 01:24:44 host sshd[27951]: Invalid user de from 194.110.203.109 port 42586 Jan 13 01:24:44 host sshd[27951]: input_userauth_request: invalid user de [preauth] Jan 13 01:24:44 host sshd[27951]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:24:44 host sshd[27951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 01:24:46 host sshd[27951]: Failed password for invalid user de from 194.110.203.109 port 42586 ssh2 Jan 13 01:24:49 host sshd[27951]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:24:51 host sshd[27951]: Failed password for invalid user de from 194.110.203.109 port 42586 ssh2 Jan 13 01:24:54 host sshd[27951]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:24:57 host sshd[27951]: Failed password for invalid user de from 194.110.203.109 port 42586 ssh2 Jan 13 01:25:00 host sshd[27951]: Connection closed by 194.110.203.109 port 42586 [preauth] Jan 13 01:25:00 host sshd[27951]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 01:26:21 host sshd[28143]: Invalid user admin from 222.99.247.86 port 61255 Jan 13 01:26:21 host sshd[28143]: input_userauth_request: invalid user admin [preauth] Jan 13 01:26:21 host sshd[28143]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:26:21 host sshd[28143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.99.247.86 Jan 13 01:26:23 host sshd[28143]: Failed password for invalid user admin from 222.99.247.86 port 61255 ssh2 Jan 13 01:26:24 host sshd[28143]: Failed password for invalid user admin from 222.99.247.86 port 61255 ssh2 Jan 13 01:26:26 host sshd[28143]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:26:28 host sshd[28143]: Failed password for invalid user admin from 222.99.247.86 port 61255 ssh2 Jan 13 01:26:29 host sshd[28143]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:26:30 host sshd[28143]: Failed password for invalid user admin from 222.99.247.86 port 61255 ssh2 Jan 13 01:37:27 host sshd[29755]: Invalid user admin from 85.47.128.10 port 3077 Jan 13 01:37:27 host sshd[29755]: input_userauth_request: invalid user admin [preauth] Jan 13 01:37:28 host sshd[29755]: pam_unix(sshd:auth): check pass; user unknown Jan 13 01:37:28 host sshd[29755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.47.128.10 Jan 13 01:37:30 host sshd[29755]: Failed password for invalid user admin from 85.47.128.10 port 3077 ssh2 Jan 13 01:37:31 host sshd[29755]: Connection closed by 85.47.128.10 port 3077 [preauth] Jan 13 01:49:29 host sshd[31647]: Connection reset by 39.112.0.147 port 61133 [preauth] Jan 13 01:50:09 host sshd[31783]: Did not receive identification string from 103.203.57.11 port 60630 Jan 13 02:02:03 host sshd[1231]: Invalid user admn from 205.185.113.129 port 36220 Jan 13 02:02:03 host sshd[1231]: input_userauth_request: invalid user admn [preauth] Jan 13 02:02:03 host sshd[1231]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:02:03 host sshd[1231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 13 02:02:05 host sshd[1231]: Failed password for invalid user admn from 205.185.113.129 port 36220 ssh2 Jan 13 02:02:05 host sshd[1231]: Connection closed by 205.185.113.129 port 36220 [preauth] Jan 13 02:12:43 host sshd[2946]: Invalid user gitlab-runner from 220.133.207.181 port 60233 Jan 13 02:12:43 host sshd[2946]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 13 02:12:44 host sshd[2946]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:12:44 host sshd[2946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.207.181 Jan 13 02:12:46 host sshd[2946]: Failed password for invalid user gitlab-runner from 220.133.207.181 port 60233 ssh2 Jan 13 02:12:46 host sshd[2946]: Connection reset by 220.133.207.181 port 60233 [preauth] Jan 13 02:18:10 host sshd[3699]: Connection reset by 175.210.83.227 port 46368 [preauth] Jan 13 02:18:52 host sshd[3768]: Connection closed by 162.243.152.18 port 57070 [preauth] Jan 13 02:19:31 host sshd[3984]: User root from 121.172.35.160 not allowed because not listed in AllowUsers Jan 13 02:19:31 host sshd[3984]: input_userauth_request: invalid user root [preauth] Jan 13 02:19:31 host unix_chkpwd[3989]: password check failed for user (root) Jan 13 02:19:31 host sshd[3984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.172.35.160 user=root Jan 13 02:19:31 host sshd[3984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 02:19:33 host sshd[3984]: Failed password for invalid user root from 121.172.35.160 port 43594 ssh2 Jan 13 02:19:33 host sshd[3984]: Connection reset by 121.172.35.160 port 43594 [preauth] Jan 13 02:21:22 host sshd[4250]: Invalid user ubnt from 178.62.224.197 port 41330 Jan 13 02:21:22 host sshd[4250]: input_userauth_request: invalid user ubnt [preauth] Jan 13 02:21:22 host sshd[4250]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:21:22 host sshd[4250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.224.197 Jan 13 02:21:24 host sshd[4250]: Failed password for invalid user ubnt from 178.62.224.197 port 41330 ssh2 Jan 13 02:21:24 host sshd[4250]: Connection closed by 178.62.224.197 port 41330 [preauth] Jan 13 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwrmswll user-2=keralaholi user-3=wwwresourcehunte user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=wwwnexidigital user-13=mrsclean user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=wwwtestugo user-25=shalinijames user-26=woodpeck user-27=wwwkapin user-28=wwwkmaorg user-29=disposeat user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 02:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Lt1wn0Wx7RYZifnf.~ Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Lt1wn0Wx7RYZifnf.~' Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Lt1wn0Wx7RYZifnf.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 02:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 02:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 02:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 02:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 02:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 02:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:27:20 host sshd[5308]: Invalid user zyfwp from 220.92.115.123 port 61279 Jan 13 02:27:20 host sshd[5308]: input_userauth_request: invalid user zyfwp [preauth] Jan 13 02:27:20 host sshd[5308]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:27:20 host sshd[5308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.92.115.123 Jan 13 02:27:22 host sshd[5308]: Failed password for invalid user zyfwp from 220.92.115.123 port 61279 ssh2 Jan 13 02:27:22 host sshd[5308]: Connection reset by 220.92.115.123 port 61279 [preauth] Jan 13 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 02:29:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 02:29:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 02:29:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 02:29:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 02:29:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:29:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=keralaholi user-5=wwwresourcehunte user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 02:29:57 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 13 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:30:11 host sshd[5778]: Invalid user usr from 119.195.175.17 port 63879 Jan 13 02:30:11 host sshd[5778]: input_userauth_request: invalid user usr [preauth] Jan 13 02:30:11 host sshd[5778]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:30:11 host sshd[5778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.195.175.17 Jan 13 02:30:13 host sshd[5778]: Failed password for invalid user usr from 119.195.175.17 port 63879 ssh2 Jan 13 02:30:14 host sshd[5778]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:30:17 host sshd[5778]: Failed password for invalid user usr from 119.195.175.17 port 63879 ssh2 Jan 13 02:30:18 host sshd[5778]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:30:20 host sshd[5778]: Failed password for invalid user usr from 119.195.175.17 port 63879 ssh2 Jan 13 02:30:22 host sshd[5778]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:30:24 host sshd[5778]: Failed password for invalid user usr from 119.195.175.17 port 63879 ssh2 Jan 13 02:30:25 host sshd[5778]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:30:27 host sshd[5778]: Failed password for invalid user usr from 119.195.175.17 port 63879 ssh2 Jan 13 02:30:28 host sshd[5778]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:30:30 host sshd[5778]: Failed password for invalid user usr from 119.195.175.17 port 63879 ssh2 Jan 13 02:30:30 host sshd[5778]: error: maximum authentication attempts exceeded for invalid user usr from 119.195.175.17 port 63879 ssh2 [preauth] Jan 13 02:30:30 host sshd[5778]: Disconnecting: Too many authentication failures [preauth] Jan 13 02:30:30 host sshd[5778]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.195.175.17 Jan 13 02:30:30 host sshd[5778]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 13 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 13 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 13 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 13 02:30:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:30:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 13 02:30:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:30:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 13 02:30:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:30:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:31:11 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 13 02:31:11 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 13 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 13 02:31:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:31:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 13 02:31:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:31:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 13 02:31:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:31:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:31:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 13 02:31:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:31:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:31:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 13 02:31:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:31:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 13 02:32:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:32:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 13 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 13 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 13 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:32:32 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 13 02:32:32 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 13 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 13 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 02:32:32 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 02:32:32 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:32:33 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 13 02:32:33 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 13 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 13 02:32:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:32:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:32:51 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 13 02:32:51 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 13 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 13 02:32:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:32:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 13 02:32:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:32:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:32:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 13 02:32:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:32:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 13 02:33:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:33:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 13 02:33:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:33:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:33:35 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 13 02:33:35 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 13 02:33:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 13 02:33:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:33:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:33:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 13 02:33:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:33:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:33:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 13 02:33:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:33:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:33:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 13 02:33:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:33:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:33:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:33:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 13 02:33:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 13 02:34:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 13 02:34:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:34:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:35:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:35:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 13 02:35:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 13 02:35:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 13 02:35:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:35:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:35:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 13 02:35:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:35:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:35:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 13 02:35:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:35:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:35:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 13 02:35:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:35:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:35:18 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 02:35:18 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 02:35:18 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 13 02:35:18 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:35:18 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:35:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:35:48 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 02:35:48 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 02:36:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 13 02:36:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:36:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:36:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:36:29 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 02:36:29 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 02:36:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 13 02:36:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:36:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:36:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 13 02:36:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:36:37 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:36:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 13 02:36:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:36:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:36:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 13 02:36:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:36:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:36:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:36:38 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 13 02:36:38 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 13 02:36:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 13 02:36:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:36:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:36:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 13 02:36:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:36:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:37:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:37:16 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 13 02:37:16 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 13 02:37:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 13 02:37:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:37:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:37:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 13 02:37:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:37:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:37:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 13 02:37:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:37:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:37:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 13 02:37:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:37:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:37:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 13 02:37:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:37:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwpmcresource WpToolkitNotification send_admin_suspicious_instance_notification 'suspicious_instance_text=The following WordPress installations are quarantined:<br/>' 'suspicious_instance_details_info=Website "Resource Hunters" (http://resourcehunters.com): WP Toolkit was not able to finish running an operation on this site in 60 seconds, so the operation was terminated. This could mean that your WordPress installation might be infected with malware. Check the wp-config.php file of the installation for potential malware code or run an anti-virus scan. If you cannot find any traces of malware, try running the operation again later.' --output=json Jan 13 02:39:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:41 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 13 02:39:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 13 02:39:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 13 02:39:42 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 13 02:39:42 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 13 02:39:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 13 02:39:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwpmcresource WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "W3 Total Cache" on Let'"'"'s Stalk Food (http://www.letsstalkfood.com). Installed version: 0.15.1. Available version: 2.2.11.<br/><br/>2. Plugin "W3 Total Cache" on Today'"'"'s Traveller (http://testugo.in/tt). Installed version: 0.14.1. Available version: 2.2.11.<br/><br/>3. Plugin "W3 Total Cache" on Today'"'"'s Traveller (http://testugo.in/tt). Installed version: 0.14.1. Available version: 2.2.11.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to Jan 13 02:39:42 host sudo: wp-toolkit : (command continued) reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 Jan 13 02:39:42 host sudo: wp-toolkit : (command continued) /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is Jan 13 02:39:42 host sudo: wp-toolkit : (command continued) down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: Jan 13 02:39:42 host sudo: wp-toolkit : (command continued) [error]FailedToExecuteWpCliCommand: chdir /home/woodpeck/public_html/wp: no such file or directory[/error]#012<br/><br/>6. Website "/home/wwwresourcehunte/public_html" (http://resourcehunters.com): Failed to reset cache for the instance #18: WP Toolkit was not able to finish running an operation on this site in 60 seconds, so the operation was terminated. This could mean that your WordPress installation might be infected with malware. Check the wp-config.php file of the installation for potential malware code or run an anti-virus scan. If you cannot find any traces of malware, try running the operation again later.<br/><br/>' --output=json Jan 13 02:39:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:39:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 02:39:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 02:52:24 host sshd[11668]: Invalid user default from 118.32.122.157 port 60130 Jan 13 02:52:24 host sshd[11668]: input_userauth_request: invalid user default [preauth] Jan 13 02:52:24 host sshd[11668]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:52:24 host sshd[11668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.122.157 Jan 13 02:52:26 host sshd[11668]: Failed password for invalid user default from 118.32.122.157 port 60130 ssh2 Jan 13 02:52:26 host sshd[11668]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:52:29 host sshd[11668]: Failed password for invalid user default from 118.32.122.157 port 60130 ssh2 Jan 13 02:52:30 host sshd[11668]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:52:31 host sshd[11668]: Failed password for invalid user default from 118.32.122.157 port 60130 ssh2 Jan 13 02:52:33 host sshd[11668]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:52:35 host sshd[11668]: Failed password for invalid user default from 118.32.122.157 port 60130 ssh2 Jan 13 02:52:36 host sshd[11668]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:52:37 host sshd[11668]: Failed password for invalid user default from 118.32.122.157 port 60130 ssh2 Jan 13 02:52:38 host sshd[11668]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:52:40 host sshd[11668]: Failed password for invalid user default from 118.32.122.157 port 60130 ssh2 Jan 13 02:52:40 host sshd[11668]: error: maximum authentication attempts exceeded for invalid user default from 118.32.122.157 port 60130 ssh2 [preauth] Jan 13 02:52:40 host sshd[11668]: Disconnecting: Too many authentication failures [preauth] Jan 13 02:52:40 host sshd[11668]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.122.157 Jan 13 02:52:40 host sshd[11668]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 13 02:55:38 host sshd[12080]: Invalid user default from 220.119.247.95 port 49519 Jan 13 02:55:38 host sshd[12080]: input_userauth_request: invalid user default [preauth] Jan 13 02:55:38 host sshd[12080]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:55:38 host sshd[12080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.119.247.95 Jan 13 02:55:40 host sshd[12080]: Failed password for invalid user default from 220.119.247.95 port 49519 ssh2 Jan 13 02:55:40 host sshd[12080]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:55:43 host sshd[12080]: Failed password for invalid user default from 220.119.247.95 port 49519 ssh2 Jan 13 02:55:45 host sshd[12080]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:55:48 host sshd[12080]: Failed password for invalid user default from 220.119.247.95 port 49519 ssh2 Jan 13 02:55:48 host sshd[12080]: pam_unix(sshd:auth): check pass; user unknown Jan 13 02:55:50 host sshd[12080]: Failed password for invalid user default from 220.119.247.95 port 49519 ssh2 Jan 13 02:55:51 host sshd[12080]: Connection reset by 220.119.247.95 port 49519 [preauth] Jan 13 02:55:51 host sshd[12080]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.119.247.95 Jan 13 02:55:51 host sshd[12080]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 13 03:01:16 host sshd[12909]: Invalid user admin from 121.130.161.129 port 61593 Jan 13 03:01:16 host sshd[12909]: input_userauth_request: invalid user admin [preauth] Jan 13 03:01:16 host sshd[12909]: pam_unix(sshd:auth): check pass; user unknown Jan 13 03:01:16 host sshd[12909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.161.129 Jan 13 03:01:18 host sshd[12909]: Failed password for invalid user admin from 121.130.161.129 port 61593 ssh2 Jan 13 03:01:20 host sshd[12909]: Failed password for invalid user admin from 121.130.161.129 port 61593 ssh2 Jan 13 03:01:22 host sshd[12909]: pam_unix(sshd:auth): check pass; user unknown Jan 13 03:01:24 host sshd[12909]: Failed password for invalid user admin from 121.130.161.129 port 61593 ssh2 Jan 13 03:01:26 host sshd[12909]: Connection reset by 121.130.161.129 port 61593 [preauth] Jan 13 03:01:26 host sshd[12909]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.161.129 Jan 13 03:05:49 host sshd[13544]: User root from 74.40.14.103 not allowed because not listed in AllowUsers Jan 13 03:05:49 host sshd[13544]: input_userauth_request: invalid user root [preauth] Jan 13 03:05:50 host unix_chkpwd[13548]: password check failed for user (root) Jan 13 03:05:50 host sshd[13544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.40.14.103 user=root Jan 13 03:05:50 host sshd[13544]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:05:51 host sshd[13544]: Failed password for invalid user root from 74.40.14.103 port 58634 ssh2 Jan 13 03:05:52 host sshd[13544]: Connection closed by 74.40.14.103 port 58634 [preauth] Jan 13 03:12:13 host sshd[14386]: Invalid user df from 194.110.203.109 port 36664 Jan 13 03:12:13 host sshd[14386]: input_userauth_request: invalid user df [preauth] Jan 13 03:12:13 host sshd[14386]: pam_unix(sshd:auth): check pass; user unknown Jan 13 03:12:13 host sshd[14386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 03:12:15 host sshd[14386]: Failed password for invalid user df from 194.110.203.109 port 36664 ssh2 Jan 13 03:12:18 host sshd[14386]: pam_unix(sshd:auth): check pass; user unknown Jan 13 03:12:19 host sshd[14386]: Failed password for invalid user df from 194.110.203.109 port 36664 ssh2 Jan 13 03:12:23 host sshd[14386]: pam_unix(sshd:auth): check pass; user unknown Jan 13 03:12:25 host sshd[14386]: Failed password for invalid user df from 194.110.203.109 port 36664 ssh2 Jan 13 03:12:28 host sshd[14386]: Connection closed by 194.110.203.109 port 36664 [preauth] Jan 13 03:12:28 host sshd[14386]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 03:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=wwwkapin user-6=woodpeck user-7=remysagr user-8=wwwkmaorg user-9=disposeat user-10=wwwnexidigital user-11=mrsclean user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=wwwkaretakers user-24=cochintaxi user-25=keralaholi user-26=wwwresourcehunte user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 03:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PfFYg5gooAW0jF2E.~ Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PfFYg5gooAW0jF2E.~' Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PfFYg5gooAW0jF2E.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 03:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 03:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 03:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 03:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 03:41:42 host sshd[20094]: User root from 161.35.119.216 not allowed because not listed in AllowUsers Jan 13 03:41:42 host sshd[20094]: input_userauth_request: invalid user root [preauth] Jan 13 03:41:42 host unix_chkpwd[20100]: password check failed for user (root) Jan 13 03:41:42 host sshd[20094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.119.216 user=root Jan 13 03:41:42 host sshd[20094]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:41:44 host sshd[20094]: Failed password for invalid user root from 161.35.119.216 port 41300 ssh2 Jan 13 03:41:44 host sshd[20094]: Received disconnect from 161.35.119.216 port 41300:11: Bye Bye [preauth] Jan 13 03:41:44 host sshd[20094]: Disconnected from 161.35.119.216 port 41300 [preauth] Jan 13 03:42:52 host sshd[20468]: User root from 84.252.143.78 not allowed because not listed in AllowUsers Jan 13 03:42:52 host sshd[20468]: input_userauth_request: invalid user root [preauth] Jan 13 03:42:52 host unix_chkpwd[20471]: password check failed for user (root) Jan 13 03:42:52 host sshd[20468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.252.143.78 user=root Jan 13 03:42:52 host sshd[20468]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:42:54 host sshd[20468]: Failed password for invalid user root from 84.252.143.78 port 35602 ssh2 Jan 13 03:42:54 host sshd[20468]: Received disconnect from 84.252.143.78 port 35602:11: Bye Bye [preauth] Jan 13 03:42:54 host sshd[20468]: Disconnected from 84.252.143.78 port 35602 [preauth] Jan 13 03:44:07 host sshd[20627]: User root from 195.9.32.22 not allowed because not listed in AllowUsers Jan 13 03:44:07 host sshd[20627]: input_userauth_request: invalid user root [preauth] Jan 13 03:44:07 host unix_chkpwd[20631]: password check failed for user (root) Jan 13 03:44:07 host sshd[20627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.32.22 user=root Jan 13 03:44:07 host sshd[20627]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:44:09 host sshd[20627]: Failed password for invalid user root from 195.9.32.22 port 42743 ssh2 Jan 13 03:44:09 host sshd[20627]: Received disconnect from 195.9.32.22 port 42743:11: Bye Bye [preauth] Jan 13 03:44:09 host sshd[20627]: Disconnected from 195.9.32.22 port 42743 [preauth] Jan 13 03:44:33 host sshd[20687]: User root from 64.227.120.10 not allowed because not listed in AllowUsers Jan 13 03:44:33 host sshd[20687]: input_userauth_request: invalid user root [preauth] Jan 13 03:44:33 host unix_chkpwd[20690]: password check failed for user (root) Jan 13 03:44:33 host sshd[20687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.120.10 user=root Jan 13 03:44:33 host sshd[20687]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:44:36 host sshd[20687]: Failed password for invalid user root from 64.227.120.10 port 52980 ssh2 Jan 13 03:44:36 host sshd[20687]: Received disconnect from 64.227.120.10 port 52980:11: Bye Bye [preauth] Jan 13 03:44:36 host sshd[20687]: Disconnected from 64.227.120.10 port 52980 [preauth] Jan 13 03:45:34 host sshd[20838]: User root from 69.119.94.212 not allowed because not listed in AllowUsers Jan 13 03:45:34 host sshd[20838]: input_userauth_request: invalid user root [preauth] Jan 13 03:45:34 host unix_chkpwd[20844]: password check failed for user (root) Jan 13 03:45:34 host sshd[20838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.119.94.212 user=root Jan 13 03:45:34 host sshd[20838]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:45:36 host sshd[20838]: Failed password for invalid user root from 69.119.94.212 port 41713 ssh2 Jan 13 03:45:36 host sshd[20838]: Received disconnect from 69.119.94.212 port 41713:11: Bye Bye [preauth] Jan 13 03:45:36 host sshd[20838]: Disconnected from 69.119.94.212 port 41713 [preauth] Jan 13 03:45:56 host sshd[20882]: User root from 165.227.118.71 not allowed because not listed in AllowUsers Jan 13 03:45:56 host sshd[20882]: input_userauth_request: invalid user root [preauth] Jan 13 03:45:56 host unix_chkpwd[20885]: password check failed for user (root) Jan 13 03:45:56 host sshd[20882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.118.71 user=root Jan 13 03:45:56 host sshd[20882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:45:58 host sshd[20882]: Failed password for invalid user root from 165.227.118.71 port 42632 ssh2 Jan 13 03:45:58 host sshd[20882]: Received disconnect from 165.227.118.71 port 42632:11: Bye Bye [preauth] Jan 13 03:45:58 host sshd[20882]: Disconnected from 165.227.118.71 port 42632 [preauth] Jan 13 03:46:04 host sshd[20897]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 13 03:46:04 host sshd[20897]: input_userauth_request: invalid user root [preauth] Jan 13 03:46:04 host unix_chkpwd[20917]: password check failed for user (root) Jan 13 03:46:04 host sshd[20897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 13 03:46:04 host sshd[20897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:46:07 host sshd[20897]: Failed password for invalid user root from 194.169.175.102 port 57616 ssh2 Jan 13 03:46:07 host sshd[20897]: Received disconnect from 194.169.175.102 port 57616:11: Client disconnecting normally [preauth] Jan 13 03:46:07 host sshd[20897]: Disconnected from 194.169.175.102 port 57616 [preauth] Jan 13 03:46:11 host sshd[20939]: User root from 110.4.42.46 not allowed because not listed in AllowUsers Jan 13 03:46:11 host sshd[20939]: input_userauth_request: invalid user root [preauth] Jan 13 03:46:11 host unix_chkpwd[20942]: password check failed for user (root) Jan 13 03:46:11 host sshd[20939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.4.42.46 user=root Jan 13 03:46:11 host sshd[20939]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:46:13 host sshd[20939]: Failed password for invalid user root from 110.4.42.46 port 53768 ssh2 Jan 13 03:46:13 host sshd[20939]: Received disconnect from 110.4.42.46 port 53768:11: Bye Bye [preauth] Jan 13 03:46:13 host sshd[20939]: Disconnected from 110.4.42.46 port 53768 [preauth] Jan 13 03:46:56 host sshd[21020]: User root from 84.252.143.78 not allowed because not listed in AllowUsers Jan 13 03:46:56 host sshd[21020]: input_userauth_request: invalid user root [preauth] Jan 13 03:46:56 host unix_chkpwd[21023]: password check failed for user (root) Jan 13 03:46:56 host sshd[21020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.252.143.78 user=root Jan 13 03:46:56 host sshd[21020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:46:58 host sshd[21020]: Failed password for invalid user root from 84.252.143.78 port 54618 ssh2 Jan 13 03:47:21 host sshd[21101]: User root from 64.227.120.10 not allowed because not listed in AllowUsers Jan 13 03:47:21 host sshd[21101]: input_userauth_request: invalid user root [preauth] Jan 13 03:47:21 host unix_chkpwd[21105]: password check failed for user (root) Jan 13 03:47:21 host sshd[21101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.120.10 user=root Jan 13 03:47:21 host sshd[21101]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:47:23 host sshd[21101]: Failed password for invalid user root from 64.227.120.10 port 34886 ssh2 Jan 13 03:47:38 host sshd[21172]: User root from 165.227.118.71 not allowed because not listed in AllowUsers Jan 13 03:47:38 host sshd[21172]: input_userauth_request: invalid user root [preauth] Jan 13 03:47:39 host unix_chkpwd[21177]: password check failed for user (root) Jan 13 03:47:39 host sshd[21172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.118.71 user=root Jan 13 03:47:39 host sshd[21172]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:47:40 host sshd[21175]: User root from 161.35.119.216 not allowed because not listed in AllowUsers Jan 13 03:47:40 host sshd[21175]: input_userauth_request: invalid user root [preauth] Jan 13 03:47:40 host unix_chkpwd[21179]: password check failed for user (root) Jan 13 03:47:40 host sshd[21175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.119.216 user=root Jan 13 03:47:40 host sshd[21175]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:47:41 host sshd[21172]: Failed password for invalid user root from 165.227.118.71 port 56156 ssh2 Jan 13 03:47:41 host sshd[21172]: Received disconnect from 165.227.118.71 port 56156:11: Bye Bye [preauth] Jan 13 03:47:41 host sshd[21172]: Disconnected from 165.227.118.71 port 56156 [preauth] Jan 13 03:47:42 host sshd[21175]: Failed password for invalid user root from 161.35.119.216 port 50606 ssh2 Jan 13 03:48:23 host sshd[21410]: User root from 195.9.32.22 not allowed because not listed in AllowUsers Jan 13 03:48:23 host sshd[21410]: input_userauth_request: invalid user root [preauth] Jan 13 03:48:23 host unix_chkpwd[21413]: password check failed for user (root) Jan 13 03:48:23 host sshd[21410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.32.22 user=root Jan 13 03:48:23 host sshd[21410]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:48:25 host sshd[21410]: Failed password for invalid user root from 195.9.32.22 port 41152 ssh2 Jan 13 03:48:25 host sshd[21410]: Received disconnect from 195.9.32.22 port 41152:11: Bye Bye [preauth] Jan 13 03:48:25 host sshd[21410]: Disconnected from 195.9.32.22 port 41152 [preauth] Jan 13 03:48:45 host sshd[21494]: User root from 69.119.94.212 not allowed because not listed in AllowUsers Jan 13 03:48:45 host sshd[21494]: input_userauth_request: invalid user root [preauth] Jan 13 03:48:45 host unix_chkpwd[21498]: password check failed for user (root) Jan 13 03:48:45 host sshd[21494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.119.94.212 user=root Jan 13 03:48:45 host sshd[21494]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:48:47 host sshd[21494]: Failed password for invalid user root from 69.119.94.212 port 59694 ssh2 Jan 13 03:48:47 host sshd[21494]: Received disconnect from 69.119.94.212 port 59694:11: Bye Bye [preauth] Jan 13 03:48:47 host sshd[21494]: Disconnected from 69.119.94.212 port 59694 [preauth] Jan 13 03:49:03 host sshd[21558]: User root from 110.4.42.46 not allowed because not listed in AllowUsers Jan 13 03:49:03 host sshd[21558]: input_userauth_request: invalid user root [preauth] Jan 13 03:49:03 host unix_chkpwd[21560]: password check failed for user (root) Jan 13 03:49:03 host sshd[21558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.4.42.46 user=root Jan 13 03:49:03 host sshd[21558]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 03:49:06 host sshd[21558]: Failed password for invalid user root from 110.4.42.46 port 32904 ssh2 Jan 13 03:49:06 host sshd[21558]: Received disconnect from 110.4.42.46 port 32904:11: Bye Bye [preauth] Jan 13 03:49:06 host sshd[21558]: Disconnected from 110.4.42.46 port 32904 [preauth] Jan 13 03:49:50 host sshd[21668]: Invalid user user from 104.236.165.32 port 53456 Jan 13 03:49:50 host sshd[21668]: input_userauth_request: invalid user user [preauth] Jan 13 03:49:51 host sshd[21668]: pam_unix(sshd:auth): check pass; user unknown Jan 13 03:49:51 host sshd[21668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.165.32 Jan 13 03:49:52 host sshd[21668]: Failed password for invalid user user from 104.236.165.32 port 53456 ssh2 Jan 13 03:49:53 host sshd[21668]: Connection closed by 104.236.165.32 port 53456 [preauth] Jan 13 04:02:28 host sshd[23536]: Invalid user admin from 218.158.23.85 port 60695 Jan 13 04:02:28 host sshd[23536]: input_userauth_request: invalid user admin [preauth] Jan 13 04:02:28 host sshd[23536]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:02:28 host sshd[23536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.158.23.85 Jan 13 04:02:30 host sshd[23536]: Failed password for invalid user admin from 218.158.23.85 port 60695 ssh2 Jan 13 04:02:30 host sshd[23536]: Connection reset by 218.158.23.85 port 60695 [preauth] Jan 13 04:04:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 04:04:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:04:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:04:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 04:04:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:04:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:04:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 04:04:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:04:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:04:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 04:04:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:04:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:04:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 04:04:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:04:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:04:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 04:04:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:04:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:04:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 04:04:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:04:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:11:47 host sshd[25020]: Invalid user vadmin from 121.160.199.28 port 35812 Jan 13 04:11:47 host sshd[25020]: input_userauth_request: invalid user vadmin [preauth] Jan 13 04:11:47 host sshd[25020]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:11:47 host sshd[25020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.160.199.28 Jan 13 04:11:49 host sshd[25020]: Failed password for invalid user vadmin from 121.160.199.28 port 35812 ssh2 Jan 13 04:11:50 host sshd[25020]: Connection reset by 121.160.199.28 port 35812 [preauth] Jan 13 04:19:19 host sshd[25974]: Invalid user admin from 80.80.102.184 port 60238 Jan 13 04:19:19 host sshd[25974]: input_userauth_request: invalid user admin [preauth] Jan 13 04:19:19 host sshd[25974]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:19:19 host sshd[25974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.80.102.184 Jan 13 04:19:21 host sshd[25974]: Failed password for invalid user admin from 80.80.102.184 port 60238 ssh2 Jan 13 04:19:22 host sshd[25974]: Failed password for invalid user admin from 80.80.102.184 port 60238 ssh2 Jan 13 04:19:23 host sshd[25974]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:19:24 host sshd[25974]: Failed password for invalid user admin from 80.80.102.184 port 60238 ssh2 Jan 13 04:19:25 host sshd[25974]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:19:27 host sshd[25974]: Failed password for invalid user admin from 80.80.102.184 port 60238 ssh2 Jan 13 04:19:28 host sshd[25974]: Connection reset by 80.80.102.184 port 60238 [preauth] Jan 13 04:19:28 host sshd[25974]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.80.102.184 Jan 13 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 04:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=wwwkmaorg user-23=remysagr user-24=disposeat user-25=wwwkapin user-26=woodpeck user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 04:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CnSi3qSyI24JQII8.~ Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CnSi3qSyI24JQII8.~' Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CnSi3qSyI24JQII8.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 04:22:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 04:26:56 host sshd[27341]: Connection reset by 60.52.189.111 port 61213 [preauth] Jan 13 04:28:19 host sshd[27716]: Invalid user postgres from 124.55.144.228 port 61946 Jan 13 04:28:19 host sshd[27716]: input_userauth_request: invalid user postgres [preauth] Jan 13 04:28:19 host sshd[27716]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:28:19 host sshd[27716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.55.144.228 Jan 13 04:28:21 host sshd[27716]: Failed password for invalid user postgres from 124.55.144.228 port 61946 ssh2 Jan 13 04:28:21 host sshd[27716]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:28:23 host sshd[27716]: Failed password for invalid user postgres from 124.55.144.228 port 61946 ssh2 Jan 13 04:28:23 host sshd[27716]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:28:26 host sshd[27716]: Failed password for invalid user postgres from 124.55.144.228 port 61946 ssh2 Jan 13 04:28:27 host sshd[27716]: Connection reset by 124.55.144.228 port 61946 [preauth] Jan 13 04:28:27 host sshd[27716]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.55.144.228 Jan 13 04:29:08 host sshd[27958]: Invalid user Admin from 118.34.9.25 port 43509 Jan 13 04:29:08 host sshd[27958]: input_userauth_request: invalid user Admin [preauth] Jan 13 04:29:08 host sshd[27958]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:29:08 host sshd[27958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.9.25 Jan 13 04:29:10 host sshd[27958]: Failed password for invalid user Admin from 118.34.9.25 port 43509 ssh2 Jan 13 04:29:11 host sshd[27958]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:29:13 host sshd[27958]: Failed password for invalid user Admin from 118.34.9.25 port 43509 ssh2 Jan 13 04:29:13 host sshd[27958]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:29:15 host sshd[27958]: Failed password for invalid user Admin from 118.34.9.25 port 43509 ssh2 Jan 13 04:29:16 host sshd[27958]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:29:18 host sshd[27958]: Failed password for invalid user Admin from 118.34.9.25 port 43509 ssh2 Jan 13 04:29:18 host sshd[27958]: Failed password for invalid user Admin from 118.34.9.25 port 43509 ssh2 Jan 13 04:29:19 host sshd[27958]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:29:20 host sshd[27958]: Failed password for invalid user Admin from 118.34.9.25 port 43509 ssh2 Jan 13 04:29:20 host sshd[27958]: error: maximum authentication attempts exceeded for invalid user Admin from 118.34.9.25 port 43509 ssh2 [preauth] Jan 13 04:29:20 host sshd[27958]: Disconnecting: Too many authentication failures [preauth] Jan 13 04:29:20 host sshd[27958]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.9.25 Jan 13 04:29:20 host sshd[27958]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 13 04:33:57 host sshd[28880]: Invalid user telnet from 121.161.224.243 port 62427 Jan 13 04:33:57 host sshd[28880]: input_userauth_request: invalid user telnet [preauth] Jan 13 04:33:57 host sshd[28880]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:33:57 host sshd[28880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.161.224.243 Jan 13 04:33:59 host sshd[28880]: Failed password for invalid user telnet from 121.161.224.243 port 62427 ssh2 Jan 13 04:34:00 host sshd[28880]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:34:02 host sshd[28880]: Failed password for invalid user telnet from 121.161.224.243 port 62427 ssh2 Jan 13 04:34:02 host sshd[29004]: Invalid user test from 91.134.242.78 port 50602 Jan 13 04:34:02 host sshd[29004]: input_userauth_request: invalid user test [preauth] Jan 13 04:34:02 host sshd[29004]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:34:02 host sshd[29004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.242.78 Jan 13 04:34:03 host sshd[28880]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:34:04 host sshd[29004]: Failed password for invalid user test from 91.134.242.78 port 50602 ssh2 Jan 13 04:34:05 host sshd[29004]: Connection closed by 91.134.242.78 port 50602 [preauth] Jan 13 04:34:05 host sshd[28880]: Failed password for invalid user telnet from 121.161.224.243 port 62427 ssh2 Jan 13 04:34:07 host sshd[28880]: Failed password for invalid user telnet from 121.161.224.243 port 62427 ssh2 Jan 13 04:34:08 host sshd[28880]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:34:10 host sshd[28880]: Failed password for invalid user telnet from 121.161.224.243 port 62427 ssh2 Jan 13 04:41:15 host sshd[30037]: Connection reset by 14.55.203.133 port 60446 [preauth] Jan 13 04:44:28 host sshd[30414]: Connection reset by 119.196.240.38 port 63721 [preauth] Jan 13 04:45:09 host sshd[30614]: Invalid user ubuntu from 186.123.183.19 port 50081 Jan 13 04:45:09 host sshd[30614]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 04:45:09 host sshd[30614]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:45:09 host sshd[30614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.123.183.19 Jan 13 04:45:11 host sshd[30614]: Failed password for invalid user ubuntu from 186.123.183.19 port 50081 ssh2 Jan 13 04:45:13 host sshd[30614]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:45:15 host sshd[30614]: Failed password for invalid user ubuntu from 186.123.183.19 port 50081 ssh2 Jan 13 04:45:16 host sshd[30614]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:45:18 host sshd[30614]: Failed password for invalid user ubuntu from 186.123.183.19 port 50081 ssh2 Jan 13 04:45:19 host sshd[30614]: Failed password for invalid user ubuntu from 186.123.183.19 port 50081 ssh2 Jan 13 04:45:22 host sshd[30614]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:45:24 host sshd[30614]: Failed password for invalid user ubuntu from 186.123.183.19 port 50081 ssh2 Jan 13 04:45:51 host sshd[30751]: Invalid user ubnt from 220.135.222.190 port 40583 Jan 13 04:45:51 host sshd[30751]: input_userauth_request: invalid user ubnt [preauth] Jan 13 04:45:51 host sshd[30751]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:45:51 host sshd[30751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.222.190 Jan 13 04:45:54 host sshd[30751]: Failed password for invalid user ubnt from 220.135.222.190 port 40583 ssh2 Jan 13 04:45:55 host sshd[30751]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:45:57 host sshd[30751]: Failed password for invalid user ubnt from 220.135.222.190 port 40583 ssh2 Jan 13 04:45:58 host sshd[30751]: Failed password for invalid user ubnt from 220.135.222.190 port 40583 ssh2 Jan 13 04:45:59 host sshd[30751]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:46:01 host sshd[30751]: Failed password for invalid user ubnt from 220.135.222.190 port 40583 ssh2 Jan 13 04:46:03 host sshd[30751]: pam_unix(sshd:auth): check pass; user unknown Jan 13 04:46:05 host sshd[30751]: Failed password for invalid user ubnt from 220.135.222.190 port 40583 ssh2 Jan 13 04:47:12 host sshd[30944]: Did not receive identification string from 154.89.5.213 port 36300 Jan 13 04:47:27 host sshd[30945]: Connection closed by 154.89.5.213 port 36338 [preauth] Jan 13 04:51:44 host sshd[31606]: User root from 165.154.242.248 not allowed because not listed in AllowUsers Jan 13 04:51:44 host sshd[31606]: input_userauth_request: invalid user root [preauth] Jan 13 04:51:44 host unix_chkpwd[31610]: password check failed for user (root) Jan 13 04:51:44 host sshd[31606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.242.248 user=root Jan 13 04:51:44 host sshd[31606]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:51:46 host sshd[31606]: Failed password for invalid user root from 165.154.242.248 port 35008 ssh2 Jan 13 04:51:46 host sshd[31606]: Received disconnect from 165.154.242.248 port 35008:11: Bye Bye [preauth] Jan 13 04:51:46 host sshd[31606]: Disconnected from 165.154.242.248 port 35008 [preauth] Jan 13 04:52:41 host sshd[31749]: User root from 138.3.246.118 not allowed because not listed in AllowUsers Jan 13 04:52:41 host sshd[31749]: input_userauth_request: invalid user root [preauth] Jan 13 04:52:41 host unix_chkpwd[31751]: password check failed for user (root) Jan 13 04:52:41 host sshd[31749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.3.246.118 user=root Jan 13 04:52:41 host sshd[31749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:52:43 host sshd[31749]: Failed password for invalid user root from 138.3.246.118 port 54960 ssh2 Jan 13 04:52:43 host sshd[31749]: Received disconnect from 138.3.246.118 port 54960:11: Bye Bye [preauth] Jan 13 04:52:43 host sshd[31749]: Disconnected from 138.3.246.118 port 54960 [preauth] Jan 13 04:53:16 host sshd[31821]: User root from 68.183.104.78 not allowed because not listed in AllowUsers Jan 13 04:53:16 host sshd[31821]: input_userauth_request: invalid user root [preauth] Jan 13 04:53:16 host unix_chkpwd[31825]: password check failed for user (root) Jan 13 04:53:16 host sshd[31821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.78 user=root Jan 13 04:53:16 host sshd[31821]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:53:18 host sshd[31821]: Failed password for invalid user root from 68.183.104.78 port 46758 ssh2 Jan 13 04:53:18 host sshd[31821]: Received disconnect from 68.183.104.78 port 46758:11: Bye Bye [preauth] Jan 13 04:53:18 host sshd[31821]: Disconnected from 68.183.104.78 port 46758 [preauth] Jan 13 04:54:21 host sshd[31958]: User root from 20.229.13.167 not allowed because not listed in AllowUsers Jan 13 04:54:21 host sshd[31958]: input_userauth_request: invalid user root [preauth] Jan 13 04:54:21 host unix_chkpwd[31961]: password check failed for user (root) Jan 13 04:54:21 host sshd[31958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.229.13.167 user=root Jan 13 04:54:21 host sshd[31958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:54:23 host sshd[31958]: Failed password for invalid user root from 20.229.13.167 port 46058 ssh2 Jan 13 04:54:23 host sshd[31958]: Received disconnect from 20.229.13.167 port 46058:11: Bye Bye [preauth] Jan 13 04:54:23 host sshd[31958]: Disconnected from 20.229.13.167 port 46058 [preauth] Jan 13 04:55:46 host sshd[32142]: User root from 24.199.121.180 not allowed because not listed in AllowUsers Jan 13 04:55:46 host sshd[32142]: input_userauth_request: invalid user root [preauth] Jan 13 04:55:47 host unix_chkpwd[32146]: password check failed for user (root) Jan 13 04:55:47 host sshd[32142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.121.180 user=root Jan 13 04:55:47 host sshd[32142]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:55:49 host sshd[32142]: Failed password for invalid user root from 24.199.121.180 port 43326 ssh2 Jan 13 04:55:49 host sshd[32142]: Connection closed by 24.199.121.180 port 43326 [preauth] Jan 13 04:56:44 host sshd[32373]: User root from 150.136.161.172 not allowed because not listed in AllowUsers Jan 13 04:56:44 host sshd[32373]: input_userauth_request: invalid user root [preauth] Jan 13 04:56:44 host unix_chkpwd[32377]: password check failed for user (root) Jan 13 04:56:44 host sshd[32373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.161.172 user=root Jan 13 04:56:44 host sshd[32373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:56:46 host sshd[32373]: Failed password for invalid user root from 150.136.161.172 port 48910 ssh2 Jan 13 04:56:46 host sshd[32373]: Received disconnect from 150.136.161.172 port 48910:11: Bye Bye [preauth] Jan 13 04:56:46 host sshd[32373]: Disconnected from 150.136.161.172 port 48910 [preauth] Jan 13 04:57:19 host sshd[32427]: User root from 43.159.40.206 not allowed because not listed in AllowUsers Jan 13 04:57:19 host sshd[32427]: input_userauth_request: invalid user root [preauth] Jan 13 04:57:19 host unix_chkpwd[32429]: password check failed for user (root) Jan 13 04:57:19 host sshd[32427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.40.206 user=root Jan 13 04:57:19 host sshd[32427]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:57:21 host sshd[32427]: Failed password for invalid user root from 43.159.40.206 port 36922 ssh2 Jan 13 04:57:21 host sshd[32427]: Received disconnect from 43.159.40.206 port 36922:11: Bye Bye [preauth] Jan 13 04:57:21 host sshd[32427]: Disconnected from 43.159.40.206 port 36922 [preauth] Jan 13 04:57:42 host sshd[32474]: User root from 165.154.242.248 not allowed because not listed in AllowUsers Jan 13 04:57:42 host sshd[32474]: input_userauth_request: invalid user root [preauth] Jan 13 04:57:42 host unix_chkpwd[32478]: password check failed for user (root) Jan 13 04:57:42 host sshd[32474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.242.248 user=root Jan 13 04:57:42 host sshd[32474]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:57:44 host sshd[32474]: Failed password for invalid user root from 165.154.242.248 port 50320 ssh2 Jan 13 04:57:44 host sshd[32474]: Received disconnect from 165.154.242.248 port 50320:11: Bye Bye [preauth] Jan 13 04:57:44 host sshd[32474]: Disconnected from 165.154.242.248 port 50320 [preauth] Jan 13 04:57:56 host sshd[32529]: User root from 68.183.104.78 not allowed because not listed in AllowUsers Jan 13 04:57:56 host sshd[32529]: input_userauth_request: invalid user root [preauth] Jan 13 04:57:56 host unix_chkpwd[32532]: password check failed for user (root) Jan 13 04:57:56 host sshd[32529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.104.78 user=root Jan 13 04:57:56 host sshd[32529]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:57:58 host sshd[32529]: Failed password for invalid user root from 68.183.104.78 port 60792 ssh2 Jan 13 04:57:59 host sshd[32529]: Received disconnect from 68.183.104.78 port 60792:11: Bye Bye [preauth] Jan 13 04:57:59 host sshd[32529]: Disconnected from 68.183.104.78 port 60792 [preauth] Jan 13 04:58:06 host sshd[32591]: User root from 138.3.246.118 not allowed because not listed in AllowUsers Jan 13 04:58:06 host sshd[32591]: input_userauth_request: invalid user root [preauth] Jan 13 04:58:06 host unix_chkpwd[32596]: password check failed for user (root) Jan 13 04:58:06 host sshd[32591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.3.246.118 user=root Jan 13 04:58:06 host sshd[32591]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:58:07 host sshd[32593]: User root from 24.199.121.180 not allowed because not listed in AllowUsers Jan 13 04:58:07 host sshd[32593]: input_userauth_request: invalid user root [preauth] Jan 13 04:58:07 host unix_chkpwd[32597]: password check failed for user (root) Jan 13 04:58:07 host sshd[32593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.121.180 user=root Jan 13 04:58:07 host sshd[32593]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:58:09 host sshd[32591]: Failed password for invalid user root from 138.3.246.118 port 46334 ssh2 Jan 13 04:58:09 host sshd[32591]: Received disconnect from 138.3.246.118 port 46334:11: Bye Bye [preauth] Jan 13 04:58:09 host sshd[32591]: Disconnected from 138.3.246.118 port 46334 [preauth] Jan 13 04:58:09 host sshd[32593]: Failed password for invalid user root from 24.199.121.180 port 59148 ssh2 Jan 13 04:58:09 host sshd[32593]: Connection closed by 24.199.121.180 port 59148 [preauth] Jan 13 04:58:44 host sshd[32740]: User root from 20.229.13.167 not allowed because not listed in AllowUsers Jan 13 04:58:44 host sshd[32740]: input_userauth_request: invalid user root [preauth] Jan 13 04:58:44 host unix_chkpwd[32745]: password check failed for user (root) Jan 13 04:58:44 host sshd[32740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.229.13.167 user=root Jan 13 04:58:44 host sshd[32740]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:58:47 host sshd[32740]: Failed password for invalid user root from 20.229.13.167 port 53772 ssh2 Jan 13 04:58:47 host sshd[32740]: Received disconnect from 20.229.13.167 port 53772:11: Bye Bye [preauth] Jan 13 04:58:47 host sshd[32740]: Disconnected from 20.229.13.167 port 53772 [preauth] Jan 13 04:58:49 host sshd[32757]: User root from 43.159.40.206 not allowed because not listed in AllowUsers Jan 13 04:58:49 host sshd[32757]: input_userauth_request: invalid user root [preauth] Jan 13 04:58:49 host unix_chkpwd[32766]: password check failed for user (root) Jan 13 04:58:49 host sshd[32757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.40.206 user=root Jan 13 04:58:49 host sshd[32757]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 04:58:52 host sshd[32757]: Failed password for invalid user root from 43.159.40.206 port 36924 ssh2 Jan 13 04:58:52 host sshd[32757]: Received disconnect from 43.159.40.206 port 36924:11: Bye Bye [preauth] Jan 13 04:58:52 host sshd[32757]: Disconnected from 43.159.40.206 port 36924 [preauth] Jan 13 05:05:47 host sshd[1456]: User root from 150.136.161.172 not allowed because not listed in AllowUsers Jan 13 05:05:47 host sshd[1456]: input_userauth_request: invalid user root [preauth] Jan 13 05:05:47 host unix_chkpwd[1459]: password check failed for user (root) Jan 13 05:05:47 host sshd[1456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.161.172 user=root Jan 13 05:05:47 host sshd[1456]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:05:48 host sshd[1456]: Failed password for invalid user root from 150.136.161.172 port 37132 ssh2 Jan 13 05:05:48 host sshd[1456]: Received disconnect from 150.136.161.172 port 37132:11: Bye Bye [preauth] Jan 13 05:05:48 host sshd[1456]: Disconnected from 150.136.161.172 port 37132 [preauth] Jan 13 05:06:05 host sshd[1520]: Invalid user dg from 194.110.203.109 port 34210 Jan 13 05:06:05 host sshd[1520]: input_userauth_request: invalid user dg [preauth] Jan 13 05:06:05 host sshd[1520]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:06:05 host sshd[1520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 05:06:07 host sshd[1520]: Failed password for invalid user dg from 194.110.203.109 port 34210 ssh2 Jan 13 05:06:11 host sshd[1520]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:06:13 host sshd[1520]: Failed password for invalid user dg from 194.110.203.109 port 34210 ssh2 Jan 13 05:06:16 host sshd[1520]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:06:18 host sshd[1520]: Failed password for invalid user dg from 194.110.203.109 port 34210 ssh2 Jan 13 05:06:21 host sshd[1520]: Connection closed by 194.110.203.109 port 34210 [preauth] Jan 13 05:06:21 host sshd[1520]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 05:07:33 host sshd[1832]: Invalid user alan from 107.189.30.59 port 57340 Jan 13 05:07:33 host sshd[1832]: input_userauth_request: invalid user alan [preauth] Jan 13 05:07:33 host sshd[1832]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:07:33 host sshd[1832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 13 05:07:35 host sshd[1832]: Failed password for invalid user alan from 107.189.30.59 port 57340 ssh2 Jan 13 05:07:35 host sshd[1832]: Connection closed by 107.189.30.59 port 57340 [preauth] Jan 13 05:14:32 host sshd[2881]: Did not receive identification string from 27.128.166.246 port 37414 Jan 13 05:14:34 host sshd[2882]: Invalid user oracle from 27.128.166.246 port 44244 Jan 13 05:14:34 host sshd[2882]: input_userauth_request: invalid user oracle [preauth] Jan 13 05:14:34 host sshd[2883]: Invalid user emqx from 27.128.166.246 port 44254 Jan 13 05:14:34 host sshd[2883]: input_userauth_request: invalid user emqx [preauth] Jan 13 05:14:34 host sshd[2885]: Invalid user gitlab-runner from 27.128.166.246 port 44224 Jan 13 05:14:34 host sshd[2885]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 13 05:14:34 host sshd[2884]: Invalid user user from 27.128.166.246 port 44274 Jan 13 05:14:34 host sshd[2884]: input_userauth_request: invalid user user [preauth] Jan 13 05:14:34 host sshd[2887]: Invalid user oracle from 27.128.166.246 port 44270 Jan 13 05:14:34 host sshd[2887]: input_userauth_request: invalid user oracle [preauth] Jan 13 05:14:34 host sshd[2886]: User root from 27.128.166.246 not allowed because not listed in AllowUsers Jan 13 05:14:34 host sshd[2886]: input_userauth_request: invalid user root [preauth] Jan 13 05:14:34 host sshd[2890]: Invalid user ubuntu from 27.128.166.246 port 44252 Jan 13 05:14:34 host sshd[2890]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 05:14:34 host sshd[2888]: Invalid user ftpuser from 27.128.166.246 port 44250 Jan 13 05:14:34 host sshd[2888]: input_userauth_request: invalid user ftpuser [preauth] Jan 13 05:14:34 host sshd[2889]: Invalid user ubuntu from 27.128.166.246 port 44212 Jan 13 05:14:34 host sshd[2889]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 05:14:34 host sshd[2897]: Invalid user ansible from 27.128.166.246 port 44272 Jan 13 05:14:34 host sshd[2897]: input_userauth_request: invalid user ansible [preauth] Jan 13 05:14:34 host sshd[2895]: Invalid user git from 27.128.166.246 port 44288 Jan 13 05:14:34 host sshd[2895]: input_userauth_request: invalid user git [preauth] Jan 13 05:14:34 host sshd[2891]: User mysql from 27.128.166.246 not allowed because not listed in AllowUsers Jan 13 05:14:34 host sshd[2891]: input_userauth_request: invalid user mysql [preauth] Jan 13 05:14:34 host sshd[2892]: Invalid user steam from 27.128.166.246 port 44226 Jan 13 05:14:34 host sshd[2892]: input_userauth_request: invalid user steam [preauth] Jan 13 05:14:34 host sshd[2899]: Invalid user testuser from 27.128.166.246 port 44232 Jan 13 05:14:34 host sshd[2899]: input_userauth_request: invalid user testuser [preauth] Jan 13 05:14:34 host sshd[2898]: Invalid user student from 27.128.166.246 port 44210 Jan 13 05:14:34 host sshd[2894]: User root from 27.128.166.246 not allowed because not listed in AllowUsers Jan 13 05:14:34 host sshd[2898]: input_userauth_request: invalid user student [preauth] Jan 13 05:14:34 host sshd[2894]: input_userauth_request: invalid user root [preauth] Jan 13 05:14:34 host sshd[2901]: Invalid user vagrant from 27.128.166.246 port 44282 Jan 13 05:14:34 host sshd[2901]: input_userauth_request: invalid user vagrant [preauth] Jan 13 05:14:34 host sshd[2902]: Invalid user test from 27.128.166.246 port 44242 Jan 13 05:14:34 host sshd[2902]: input_userauth_request: invalid user test [preauth] Jan 13 05:14:34 host sshd[2906]: Invalid user emqx from 27.128.166.246 port 44262 Jan 13 05:14:34 host sshd[2906]: input_userauth_request: invalid user emqx [preauth] Jan 13 05:14:34 host sshd[2908]: Invalid user ec2-user from 27.128.166.246 port 44230 Jan 13 05:14:34 host sshd[2908]: input_userauth_request: invalid user ec2-user [preauth] Jan 13 05:14:34 host sshd[2911]: Invalid user admin from 27.128.166.246 port 44208 Jan 13 05:14:34 host sshd[2911]: input_userauth_request: invalid user admin [preauth] Jan 13 05:14:34 host sshd[2907]: User root from 27.128.166.246 not allowed because not listed in AllowUsers Jan 13 05:14:34 host sshd[2907]: input_userauth_request: invalid user root [preauth] Jan 13 05:14:34 host sshd[2913]: Invalid user oracle from 27.128.166.246 port 44248 Jan 13 05:14:34 host sshd[2913]: input_userauth_request: invalid user oracle [preauth] Jan 13 05:14:34 host sshd[2912]: User root from 27.128.166.246 not allowed because not listed in AllowUsers Jan 13 05:14:34 host sshd[2912]: input_userauth_request: invalid user root [preauth] Jan 13 05:14:34 host sshd[2915]: Invalid user ansadmin from 27.128.166.246 port 44276 Jan 13 05:14:34 host sshd[2915]: input_userauth_request: invalid user ansadmin [preauth] Jan 13 05:14:34 host sshd[2914]: User root from 27.128.166.246 not allowed because not listed in AllowUsers Jan 13 05:14:34 host sshd[2914]: input_userauth_request: invalid user root [preauth] Jan 13 05:14:34 host sshd[2882]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2883]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2885]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2884]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2887]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2890]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2888]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2889]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host unix_chkpwd[2938]: password check failed for user (root) Jan 13 05:14:34 host sshd[2886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 user=root Jan 13 05:14:34 host sshd[2886]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:14:34 host sshd[2897]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2895]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2892]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host unix_chkpwd[2939]: password check failed for user (mysql) Jan 13 05:14:34 host sshd[2891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 user=mysql Jan 13 05:14:34 host sshd[2891]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 13 05:14:34 host sshd[2899]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2898]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2902]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2901]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host unix_chkpwd[2940]: password check failed for user (root) Jan 13 05:14:34 host sshd[2894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 user=root Jan 13 05:14:34 host sshd[2894]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:14:34 host sshd[2906]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2908]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2911]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2913]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host unix_chkpwd[2941]: password check failed for user (root) Jan 13 05:14:34 host sshd[2915]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:34 host sshd[2915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:34 host sshd[2907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 user=root Jan 13 05:14:34 host sshd[2907]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:14:34 host unix_chkpwd[2942]: password check failed for user (root) Jan 13 05:14:34 host sshd[2912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 user=root Jan 13 05:14:34 host sshd[2912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:14:34 host unix_chkpwd[2943]: password check failed for user (root) Jan 13 05:14:34 host sshd[2914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 user=root Jan 13 05:14:34 host sshd[2914]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:14:34 host sshd[2893]: Invalid user ec2-user from 27.128.166.246 port 44294 Jan 13 05:14:34 host sshd[2893]: input_userauth_request: invalid user ec2-user [preauth] Jan 13 05:14:35 host sshd[2893]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:14:35 host sshd[2893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.166.246 Jan 13 05:14:36 host sshd[2882]: Failed password for invalid user oracle from 27.128.166.246 port 44244 ssh2 Jan 13 05:14:36 host sshd[2883]: Failed password for invalid user emqx from 27.128.166.246 port 44254 ssh2 Jan 13 05:14:36 host sshd[2885]: Failed password for invalid user gitlab-runner from 27.128.166.246 port 44224 ssh2 Jan 13 05:14:36 host sshd[2884]: Failed password for invalid user user from 27.128.166.246 port 44274 ssh2 Jan 13 05:14:36 host sshd[2887]: Failed password for invalid user oracle from 27.128.166.246 port 44270 ssh2 Jan 13 05:14:36 host sshd[2890]: Failed password for invalid user ubuntu from 27.128.166.246 port 44252 ssh2 Jan 13 05:14:36 host sshd[2888]: Failed password for invalid user ftpuser from 27.128.166.246 port 44250 ssh2 Jan 13 05:14:36 host sshd[2889]: Failed password for invalid user ubuntu from 27.128.166.246 port 44212 ssh2 Jan 13 05:14:36 host sshd[2886]: Failed password for invalid user root from 27.128.166.246 port 44218 ssh2 Jan 13 05:14:36 host sshd[2897]: Failed password for invalid user ansible from 27.128.166.246 port 44272 ssh2 Jan 13 05:14:36 host sshd[2895]: Failed password for invalid user git from 27.128.166.246 port 44288 ssh2 Jan 13 05:14:36 host sshd[2892]: Failed password for invalid user steam from 27.128.166.246 port 44226 ssh2 Jan 13 05:14:36 host sshd[2891]: Failed password for invalid user mysql from 27.128.166.246 port 44220 ssh2 Jan 13 05:14:37 host sshd[2899]: Failed password for invalid user testuser from 27.128.166.246 port 44232 ssh2 Jan 13 05:14:37 host sshd[2898]: Failed password for invalid user student from 27.128.166.246 port 44210 ssh2 Jan 13 05:14:37 host sshd[2902]: Failed password for invalid user test from 27.128.166.246 port 44242 ssh2 Jan 13 05:14:37 host sshd[2901]: Failed password for invalid user vagrant from 27.128.166.246 port 44282 ssh2 Jan 13 05:14:37 host sshd[2894]: Failed password for invalid user root from 27.128.166.246 port 44268 ssh2 Jan 13 05:14:37 host sshd[2906]: Failed password for invalid user emqx from 27.128.166.246 port 44262 ssh2 Jan 13 05:14:37 host sshd[2908]: Failed password for invalid user ec2-user from 27.128.166.246 port 44230 ssh2 Jan 13 05:14:37 host sshd[2911]: Failed password for invalid user admin from 27.128.166.246 port 44208 ssh2 Jan 13 05:14:37 host sshd[2913]: Failed password for invalid user oracle from 27.128.166.246 port 44248 ssh2 Jan 13 05:14:37 host sshd[2915]: Failed password for invalid user ansadmin from 27.128.166.246 port 44276 ssh2 Jan 13 05:14:37 host sshd[2907]: Failed password for invalid user root from 27.128.166.246 port 44266 ssh2 Jan 13 05:14:37 host sshd[2912]: Failed password for invalid user root from 27.128.166.246 port 44284 ssh2 Jan 13 05:14:37 host sshd[2914]: Failed password for invalid user root from 27.128.166.246 port 44260 ssh2 Jan 13 05:14:37 host sshd[2893]: Failed password for invalid user ec2-user from 27.128.166.246 port 44294 ssh2 Jan 13 05:21:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 05:21:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:21:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=wwwkmaorg user-15=disposeat user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=wwwtestugo user-20=shalinijames user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=mrsclean user-26=wwwnexidigital user-27=gifterman user-28=palco123 user-29=kottayamcalldriv user-30=phmetals feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 05:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 13 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 13 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 05:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 13 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 13 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-sD3dmCm2QVYvAK3I.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-sD3dmCm2QVYvAK3I.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 13 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 13 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 13 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 13 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 13 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 13 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 13 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 13 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 13 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 13 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-F16DhIk5lA2sFC2r.wp-toolkit-identifier Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 13 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-F16DhIk5lA2sFC2r.wp-toolkit-identifier Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 13 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 05:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ypiFGs3OooVak2TF.~ Jan 13 05:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ypiFGs3OooVak2TF.~' Jan 13 05:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ypiFGs3OooVak2TF.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 05:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 05:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 05:22:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 05:22:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 05:22:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 05:28:48 host sshd[5578]: Invalid user admin from 118.47.97.55 port 62623 Jan 13 05:28:48 host sshd[5578]: input_userauth_request: invalid user admin [preauth] Jan 13 05:28:48 host sshd[5578]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:28:48 host sshd[5578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.47.97.55 Jan 13 05:28:50 host sshd[5578]: Failed password for invalid user admin from 118.47.97.55 port 62623 ssh2 Jan 13 05:28:50 host sshd[5578]: Failed password for invalid user admin from 118.47.97.55 port 62623 ssh2 Jan 13 05:28:52 host sshd[5578]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:28:53 host sshd[5578]: Failed password for invalid user admin from 118.47.97.55 port 62623 ssh2 Jan 13 05:28:54 host sshd[5578]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:28:56 host sshd[5578]: Failed password for invalid user admin from 118.47.97.55 port 62623 ssh2 Jan 13 05:28:57 host sshd[5578]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:28:59 host sshd[5578]: Failed password for invalid user admin from 118.47.97.55 port 62623 ssh2 Jan 13 05:29:00 host sshd[5578]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:29:02 host sshd[5578]: Failed password for invalid user admin from 118.47.97.55 port 62623 ssh2 Jan 13 05:29:02 host sshd[5578]: error: maximum authentication attempts exceeded for invalid user admin from 118.47.97.55 port 62623 ssh2 [preauth] Jan 13 05:29:02 host sshd[5578]: Disconnecting: Too many authentication failures [preauth] Jan 13 05:29:02 host sshd[5578]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.47.97.55 Jan 13 05:29:02 host sshd[5578]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 13 05:29:55 host sshd[5831]: Invalid user from 64.62.197.27 port 35709 Jan 13 05:29:55 host sshd[5831]: input_userauth_request: invalid user [preauth] Jan 13 05:29:58 host sshd[5831]: Connection closed by 64.62.197.27 port 35709 [preauth] Jan 13 05:31:05 host sshd[6008]: User root from 107.170.118.81 not allowed because not listed in AllowUsers Jan 13 05:31:05 host sshd[6008]: input_userauth_request: invalid user root [preauth] Jan 13 05:31:05 host unix_chkpwd[6016]: password check failed for user (root) Jan 13 05:31:05 host sshd[6008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.118.81 user=root Jan 13 05:31:05 host sshd[6008]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:31:06 host sshd[6010]: User root from 201.217.159.155 not allowed because not listed in AllowUsers Jan 13 05:31:06 host sshd[6010]: input_userauth_request: invalid user root [preauth] Jan 13 05:31:06 host unix_chkpwd[6019]: password check failed for user (root) Jan 13 05:31:06 host sshd[6010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.159.155 user=root Jan 13 05:31:06 host sshd[6010]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:31:07 host sshd[6008]: Failed password for invalid user root from 107.170.118.81 port 41139 ssh2 Jan 13 05:31:07 host sshd[6008]: Received disconnect from 107.170.118.81 port 41139:11: Bye Bye [preauth] Jan 13 05:31:07 host sshd[6008]: Disconnected from 107.170.118.81 port 41139 [preauth] Jan 13 05:31:08 host sshd[6010]: Failed password for invalid user root from 201.217.159.155 port 45293 ssh2 Jan 13 05:31:08 host sshd[6010]: Received disconnect from 201.217.159.155 port 45293:11: Bye Bye [preauth] Jan 13 05:31:08 host sshd[6010]: Disconnected from 201.217.159.155 port 45293 [preauth] Jan 13 05:32:10 host sshd[6148]: User root from 159.65.223.90 not allowed because not listed in AllowUsers Jan 13 05:32:10 host sshd[6148]: input_userauth_request: invalid user root [preauth] Jan 13 05:32:10 host unix_chkpwd[6155]: password check failed for user (root) Jan 13 05:32:10 host sshd[6148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.223.90 user=root Jan 13 05:32:10 host sshd[6148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:32:12 host sshd[6148]: Failed password for invalid user root from 159.65.223.90 port 34520 ssh2 Jan 13 05:32:12 host sshd[6148]: Received disconnect from 159.65.223.90 port 34520:11: Bye Bye [preauth] Jan 13 05:32:12 host sshd[6148]: Disconnected from 159.65.223.90 port 34520 [preauth] Jan 13 05:34:58 host sshd[6608]: User root from 159.65.223.90 not allowed because not listed in AllowUsers Jan 13 05:34:58 host sshd[6608]: input_userauth_request: invalid user root [preauth] Jan 13 05:34:58 host unix_chkpwd[6612]: password check failed for user (root) Jan 13 05:34:58 host sshd[6608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.223.90 user=root Jan 13 05:34:58 host sshd[6608]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:35:00 host sshd[6608]: Failed password for invalid user root from 159.65.223.90 port 34634 ssh2 Jan 13 05:35:00 host sshd[6608]: Received disconnect from 159.65.223.90 port 34634:11: Bye Bye [preauth] Jan 13 05:35:00 host sshd[6608]: Disconnected from 159.65.223.90 port 34634 [preauth] Jan 13 05:35:03 host sshd[6625]: User root from 201.217.159.155 not allowed because not listed in AllowUsers Jan 13 05:35:03 host sshd[6625]: input_userauth_request: invalid user root [preauth] Jan 13 05:35:03 host unix_chkpwd[6691]: password check failed for user (root) Jan 13 05:35:03 host sshd[6625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.159.155 user=root Jan 13 05:35:03 host sshd[6625]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:35:05 host sshd[6625]: Failed password for invalid user root from 201.217.159.155 port 36852 ssh2 Jan 13 05:35:05 host sshd[6625]: Received disconnect from 201.217.159.155 port 36852:11: Bye Bye [preauth] Jan 13 05:35:05 host sshd[6625]: Disconnected from 201.217.159.155 port 36852 [preauth] Jan 13 05:35:44 host sshd[6799]: User root from 107.170.118.81 not allowed because not listed in AllowUsers Jan 13 05:35:44 host sshd[6799]: input_userauth_request: invalid user root [preauth] Jan 13 05:35:44 host unix_chkpwd[6802]: password check failed for user (root) Jan 13 05:35:44 host sshd[6799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.118.81 user=root Jan 13 05:35:44 host sshd[6799]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:35:46 host sshd[6799]: Failed password for invalid user root from 107.170.118.81 port 36746 ssh2 Jan 13 05:35:46 host sshd[6799]: Received disconnect from 107.170.118.81 port 36746:11: Bye Bye [preauth] Jan 13 05:35:46 host sshd[6799]: Disconnected from 107.170.118.81 port 36746 [preauth] Jan 13 05:38:33 host sshd[7244]: Invalid user admin from 121.132.99.138 port 61999 Jan 13 05:38:33 host sshd[7244]: input_userauth_request: invalid user admin [preauth] Jan 13 05:38:33 host sshd[7244]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:38:33 host sshd[7244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.99.138 Jan 13 05:38:35 host sshd[7244]: Failed password for invalid user admin from 121.132.99.138 port 61999 ssh2 Jan 13 05:38:36 host sshd[7244]: Failed password for invalid user admin from 121.132.99.138 port 61999 ssh2 Jan 13 05:38:37 host sshd[7244]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:38:39 host sshd[7244]: Failed password for invalid user admin from 121.132.99.138 port 61999 ssh2 Jan 13 05:38:40 host sshd[7244]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:38:42 host sshd[7244]: Failed password for invalid user admin from 121.132.99.138 port 61999 ssh2 Jan 13 05:38:43 host sshd[7244]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:38:45 host sshd[7244]: Failed password for invalid user admin from 121.132.99.138 port 61999 ssh2 Jan 13 05:45:03 host sshd[8382]: Invalid user emcali from 61.81.83.63 port 47513 Jan 13 05:45:03 host sshd[8382]: input_userauth_request: invalid user emcali [preauth] Jan 13 05:45:03 host sshd[8382]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:45:03 host sshd[8382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.81.83.63 Jan 13 05:45:05 host sshd[8382]: Failed password for invalid user emcali from 61.81.83.63 port 47513 ssh2 Jan 13 05:45:06 host sshd[8382]: Connection reset by 61.81.83.63 port 47513 [preauth] Jan 13 05:47:47 host sshd[8761]: User root from 185.59.74.158 not allowed because not listed in AllowUsers Jan 13 05:47:47 host sshd[8761]: input_userauth_request: invalid user root [preauth] Jan 13 05:47:47 host unix_chkpwd[8765]: password check failed for user (root) Jan 13 05:47:47 host sshd[8761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.59.74.158 user=root Jan 13 05:47:47 host sshd[8761]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:47:50 host sshd[8761]: Failed password for invalid user root from 185.59.74.158 port 45546 ssh2 Jan 13 05:47:50 host sshd[8761]: Received disconnect from 185.59.74.158 port 45546:11: Bye Bye [preauth] Jan 13 05:47:50 host sshd[8761]: Disconnected from 185.59.74.158 port 45546 [preauth] Jan 13 05:48:17 host sshd[8817]: User root from 59.4.9.69 not allowed because not listed in AllowUsers Jan 13 05:48:17 host sshd[8817]: input_userauth_request: invalid user root [preauth] Jan 13 05:48:17 host unix_chkpwd[8828]: password check failed for user (root) Jan 13 05:48:17 host sshd[8817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.4.9.69 user=root Jan 13 05:48:17 host sshd[8817]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:48:19 host sshd[8829]: User root from 190.64.136.124 not allowed because not listed in AllowUsers Jan 13 05:48:19 host sshd[8829]: input_userauth_request: invalid user root [preauth] Jan 13 05:48:19 host unix_chkpwd[8833]: password check failed for user (root) Jan 13 05:48:19 host sshd[8829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.136.124 user=root Jan 13 05:48:19 host sshd[8829]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:48:19 host sshd[8817]: Failed password for invalid user root from 59.4.9.69 port 58457 ssh2 Jan 13 05:48:20 host unix_chkpwd[8835]: password check failed for user (root) Jan 13 05:48:20 host sshd[8817]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:48:21 host sshd[8829]: Failed password for invalid user root from 190.64.136.124 port 17201 ssh2 Jan 13 05:48:22 host sshd[8829]: Received disconnect from 190.64.136.124 port 17201:11: Bye Bye [preauth] Jan 13 05:48:22 host sshd[8829]: Disconnected from 190.64.136.124 port 17201 [preauth] Jan 13 05:48:22 host sshd[8817]: Failed password for invalid user root from 59.4.9.69 port 58457 ssh2 Jan 13 05:48:22 host sshd[8817]: Connection reset by 59.4.9.69 port 58457 [preauth] Jan 13 05:48:22 host sshd[8817]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.4.9.69 user=root Jan 13 05:48:34 host sshd[8885]: User root from 185.221.239.3 not allowed because not listed in AllowUsers Jan 13 05:48:34 host sshd[8885]: input_userauth_request: invalid user root [preauth] Jan 13 05:48:34 host unix_chkpwd[8888]: password check failed for user (root) Jan 13 05:48:34 host sshd[8885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.221.239.3 user=root Jan 13 05:48:34 host sshd[8885]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:48:36 host sshd[8885]: Failed password for invalid user root from 185.221.239.3 port 60922 ssh2 Jan 13 05:48:36 host sshd[8885]: Received disconnect from 185.221.239.3 port 60922:11: Bye Bye [preauth] Jan 13 05:48:36 host sshd[8885]: Disconnected from 185.221.239.3 port 60922 [preauth] Jan 13 05:49:12 host sshd[8945]: User root from 104.168.102.32 not allowed because not listed in AllowUsers Jan 13 05:49:12 host sshd[8945]: input_userauth_request: invalid user root [preauth] Jan 13 05:49:12 host unix_chkpwd[8950]: password check failed for user (root) Jan 13 05:49:12 host sshd[8945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.102.32 user=root Jan 13 05:49:12 host sshd[8945]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:49:14 host sshd[8945]: Failed password for invalid user root from 104.168.102.32 port 43022 ssh2 Jan 13 05:49:14 host sshd[8945]: Received disconnect from 104.168.102.32 port 43022:11: Bye Bye [preauth] Jan 13 05:49:14 host sshd[8945]: Disconnected from 104.168.102.32 port 43022 [preauth] Jan 13 05:49:57 host sshd[9237]: Invalid user admin from 183.109.168.231 port 61149 Jan 13 05:49:57 host sshd[9237]: input_userauth_request: invalid user admin [preauth] Jan 13 05:49:57 host sshd[9237]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:49:57 host sshd[9237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.168.231 Jan 13 05:49:59 host sshd[9237]: Failed password for invalid user admin from 183.109.168.231 port 61149 ssh2 Jan 13 05:49:59 host sshd[9237]: Failed password for invalid user admin from 183.109.168.231 port 61149 ssh2 Jan 13 05:50:00 host sshd[9237]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:50:02 host sshd[9237]: Failed password for invalid user admin from 183.109.168.231 port 61149 ssh2 Jan 13 05:50:03 host sshd[9237]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:50:05 host sshd[9237]: Failed password for invalid user admin from 183.109.168.231 port 61149 ssh2 Jan 13 05:50:06 host sshd[9237]: pam_unix(sshd:auth): check pass; user unknown Jan 13 05:50:07 host sshd[9237]: Failed password for invalid user admin from 183.109.168.231 port 61149 ssh2 Jan 13 05:50:27 host sshd[9416]: User root from 217.234.82.44 not allowed because not listed in AllowUsers Jan 13 05:50:27 host sshd[9416]: input_userauth_request: invalid user root [preauth] Jan 13 05:50:27 host unix_chkpwd[9419]: password check failed for user (root) Jan 13 05:50:27 host sshd[9416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.234.82.44 user=root Jan 13 05:50:27 host sshd[9416]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:50:29 host sshd[9416]: Failed password for invalid user root from 217.234.82.44 port 41146 ssh2 Jan 13 05:50:29 host sshd[9416]: Received disconnect from 217.234.82.44 port 41146:11: Bye Bye [preauth] Jan 13 05:50:29 host sshd[9416]: Disconnected from 217.234.82.44 port 41146 [preauth] Jan 13 05:51:32 host sshd[9576]: User root from 95.167.178.44 not allowed because not listed in AllowUsers Jan 13 05:51:32 host sshd[9576]: input_userauth_request: invalid user root [preauth] Jan 13 05:51:32 host unix_chkpwd[9579]: password check failed for user (root) Jan 13 05:51:32 host sshd[9576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.178.44 user=root Jan 13 05:51:32 host sshd[9576]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:51:34 host sshd[9576]: Failed password for invalid user root from 95.167.178.44 port 36542 ssh2 Jan 13 05:51:35 host sshd[9576]: Received disconnect from 95.167.178.44 port 36542:11: Bye Bye [preauth] Jan 13 05:51:35 host sshd[9576]: Disconnected from 95.167.178.44 port 36542 [preauth] Jan 13 05:51:35 host sshd[9581]: User root from 206.189.233.163 not allowed because not listed in AllowUsers Jan 13 05:51:35 host sshd[9581]: input_userauth_request: invalid user root [preauth] Jan 13 05:51:35 host unix_chkpwd[9585]: password check failed for user (root) Jan 13 05:51:35 host sshd[9581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.233.163 user=root Jan 13 05:51:35 host sshd[9581]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:51:37 host sshd[9581]: Failed password for invalid user root from 206.189.233.163 port 57584 ssh2 Jan 13 05:51:37 host sshd[9581]: Received disconnect from 206.189.233.163 port 57584:11: Bye Bye [preauth] Jan 13 05:51:37 host sshd[9581]: Disconnected from 206.189.233.163 port 57584 [preauth] Jan 13 05:51:40 host sshd[9593]: User root from 187.217.117.3 not allowed because not listed in AllowUsers Jan 13 05:51:40 host sshd[9593]: input_userauth_request: invalid user root [preauth] Jan 13 05:51:40 host unix_chkpwd[9596]: password check failed for user (root) Jan 13 05:51:40 host sshd[9593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.117.3 user=root Jan 13 05:51:40 host sshd[9593]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:51:42 host sshd[9598]: User root from 198.211.121.90 not allowed because not listed in AllowUsers Jan 13 05:51:42 host sshd[9598]: input_userauth_request: invalid user root [preauth] Jan 13 05:51:42 host unix_chkpwd[9602]: password check failed for user (root) Jan 13 05:51:42 host sshd[9598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.121.90 user=root Jan 13 05:51:42 host sshd[9598]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:51:43 host sshd[9593]: Failed password for invalid user root from 187.217.117.3 port 47430 ssh2 Jan 13 05:51:43 host sshd[9593]: Received disconnect from 187.217.117.3 port 47430:11: Bye Bye [preauth] Jan 13 05:51:43 host sshd[9593]: Disconnected from 187.217.117.3 port 47430 [preauth] Jan 13 05:51:44 host sshd[9598]: Failed password for invalid user root from 198.211.121.90 port 56588 ssh2 Jan 13 05:51:44 host sshd[9598]: Received disconnect from 198.211.121.90 port 56588:11: Bye Bye [preauth] Jan 13 05:51:44 host sshd[9598]: Disconnected from 198.211.121.90 port 56588 [preauth] Jan 13 05:52:04 host sshd[9660]: User root from 177.126.216.120 not allowed because not listed in AllowUsers Jan 13 05:52:04 host sshd[9660]: input_userauth_request: invalid user root [preauth] Jan 13 05:52:04 host unix_chkpwd[9664]: password check failed for user (root) Jan 13 05:52:04 host sshd[9660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.126.216.120 user=root Jan 13 05:52:04 host sshd[9660]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:52:06 host sshd[9660]: Failed password for invalid user root from 177.126.216.120 port 12454 ssh2 Jan 13 05:52:07 host sshd[9660]: Received disconnect from 177.126.216.120 port 12454:11: Bye Bye [preauth] Jan 13 05:52:07 host sshd[9660]: Disconnected from 177.126.216.120 port 12454 [preauth] Jan 13 05:52:11 host sshd[9682]: User root from 51.91.151.44 not allowed because not listed in AllowUsers Jan 13 05:52:11 host sshd[9682]: input_userauth_request: invalid user root [preauth] Jan 13 05:52:11 host unix_chkpwd[9685]: password check failed for user (root) Jan 13 05:52:11 host sshd[9682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.151.44 user=root Jan 13 05:52:11 host sshd[9682]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:52:13 host sshd[9682]: Failed password for invalid user root from 51.91.151.44 port 36894 ssh2 Jan 13 05:52:13 host sshd[9682]: Received disconnect from 51.91.151.44 port 36894:11: Bye Bye [preauth] Jan 13 05:52:13 host sshd[9682]: Disconnected from 51.91.151.44 port 36894 [preauth] Jan 13 05:52:29 host sshd[9738]: User root from 159.65.2.149 not allowed because not listed in AllowUsers Jan 13 05:52:29 host sshd[9738]: input_userauth_request: invalid user root [preauth] Jan 13 05:52:29 host unix_chkpwd[9740]: password check failed for user (root) Jan 13 05:52:29 host sshd[9738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.2.149 user=root Jan 13 05:52:29 host sshd[9738]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:52:32 host sshd[9738]: Failed password for invalid user root from 159.65.2.149 port 40668 ssh2 Jan 13 05:52:32 host sshd[9738]: Received disconnect from 159.65.2.149 port 40668:11: Bye Bye [preauth] Jan 13 05:52:32 host sshd[9738]: Disconnected from 159.65.2.149 port 40668 [preauth] Jan 13 05:52:36 host sshd[9745]: User root from 137.184.226.220 not allowed because not listed in AllowUsers Jan 13 05:52:36 host sshd[9745]: input_userauth_request: invalid user root [preauth] Jan 13 05:52:36 host unix_chkpwd[9748]: password check failed for user (root) Jan 13 05:52:36 host sshd[9745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.226.220 user=root Jan 13 05:52:36 host sshd[9745]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:52:37 host sshd[9745]: Failed password for invalid user root from 137.184.226.220 port 35826 ssh2 Jan 13 05:52:37 host sshd[9745]: Received disconnect from 137.184.226.220 port 35826:11: Bye Bye [preauth] Jan 13 05:52:37 host sshd[9745]: Disconnected from 137.184.226.220 port 35826 [preauth] Jan 13 05:52:46 host sshd[9760]: User root from 137.184.120.104 not allowed because not listed in AllowUsers Jan 13 05:52:46 host sshd[9760]: input_userauth_request: invalid user root [preauth] Jan 13 05:52:46 host unix_chkpwd[9764]: password check failed for user (root) Jan 13 05:52:46 host sshd[9760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.120.104 user=root Jan 13 05:52:46 host sshd[9760]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:52:48 host sshd[9760]: Failed password for invalid user root from 137.184.120.104 port 40838 ssh2 Jan 13 05:52:48 host sshd[9760]: Received disconnect from 137.184.120.104 port 40838:11: Bye Bye [preauth] Jan 13 05:52:48 host sshd[9760]: Disconnected from 137.184.120.104 port 40838 [preauth] Jan 13 05:53:12 host sshd[9833]: User root from 103.181.143.143 not allowed because not listed in AllowUsers Jan 13 05:53:12 host sshd[9833]: input_userauth_request: invalid user root [preauth] Jan 13 05:53:12 host unix_chkpwd[9835]: password check failed for user (root) Jan 13 05:53:12 host sshd[9833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.181.143.143 user=root Jan 13 05:53:12 host sshd[9833]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:53:14 host sshd[9833]: Failed password for invalid user root from 103.181.143.143 port 59922 ssh2 Jan 13 05:53:14 host sshd[9833]: Received disconnect from 103.181.143.143 port 59922:11: Bye Bye [preauth] Jan 13 05:53:14 host sshd[9833]: Disconnected from 103.181.143.143 port 59922 [preauth] Jan 13 05:53:28 host sshd[9866]: User root from 45.55.64.209 not allowed because not listed in AllowUsers Jan 13 05:53:28 host sshd[9866]: input_userauth_request: invalid user root [preauth] Jan 13 05:53:28 host unix_chkpwd[9891]: password check failed for user (root) Jan 13 05:53:28 host sshd[9866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.64.209 user=root Jan 13 05:53:28 host sshd[9866]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:53:30 host sshd[9866]: Failed password for invalid user root from 45.55.64.209 port 49415 ssh2 Jan 13 05:53:30 host sshd[9866]: Received disconnect from 45.55.64.209 port 49415:11: Bye Bye [preauth] Jan 13 05:53:30 host sshd[9866]: Disconnected from 45.55.64.209 port 49415 [preauth] Jan 13 05:53:46 host sshd[9916]: User root from 185.59.74.158 not allowed because not listed in AllowUsers Jan 13 05:53:46 host sshd[9916]: input_userauth_request: invalid user root [preauth] Jan 13 05:53:46 host unix_chkpwd[9920]: password check failed for user (root) Jan 13 05:53:46 host sshd[9916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.59.74.158 user=root Jan 13 05:53:46 host sshd[9916]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:53:48 host sshd[9916]: Failed password for invalid user root from 185.59.74.158 port 38670 ssh2 Jan 13 05:53:52 host sshd[9959]: User root from 80.91.167.80 not allowed because not listed in AllowUsers Jan 13 05:53:52 host sshd[9959]: input_userauth_request: invalid user root [preauth] Jan 13 05:53:52 host unix_chkpwd[9963]: password check failed for user (root) Jan 13 05:53:52 host sshd[9959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.91.167.80 user=root Jan 13 05:53:52 host sshd[9959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:53:54 host sshd[9959]: Failed password for invalid user root from 80.91.167.80 port 40580 ssh2 Jan 13 05:53:54 host sshd[9959]: Received disconnect from 80.91.167.80 port 40580:11: Bye Bye [preauth] Jan 13 05:53:54 host sshd[9959]: Disconnected from 80.91.167.80 port 40580 [preauth] Jan 13 05:53:58 host sshd[9974]: User root from 104.168.102.32 not allowed because not listed in AllowUsers Jan 13 05:53:58 host sshd[9974]: input_userauth_request: invalid user root [preauth] Jan 13 05:53:58 host unix_chkpwd[9978]: password check failed for user (root) Jan 13 05:53:58 host sshd[9974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.102.32 user=root Jan 13 05:53:58 host sshd[9974]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:54:01 host sshd[9974]: Failed password for invalid user root from 104.168.102.32 port 38970 ssh2 Jan 13 05:54:01 host sshd[9974]: Received disconnect from 104.168.102.32 port 38970:11: Bye Bye [preauth] Jan 13 05:54:01 host sshd[9974]: Disconnected from 104.168.102.32 port 38970 [preauth] Jan 13 05:54:09 host sshd[10040]: User root from 52.170.31.174 not allowed because not listed in AllowUsers Jan 13 05:54:09 host sshd[10040]: input_userauth_request: invalid user root [preauth] Jan 13 05:54:09 host unix_chkpwd[10044]: password check failed for user (root) Jan 13 05:54:09 host sshd[10040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.31.174 user=root Jan 13 05:54:09 host sshd[10040]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:54:11 host sshd[10040]: Failed password for invalid user root from 52.170.31.174 port 37402 ssh2 Jan 13 05:54:11 host sshd[10040]: Received disconnect from 52.170.31.174 port 37402:11: Bye Bye [preauth] Jan 13 05:54:11 host sshd[10040]: Disconnected from 52.170.31.174 port 37402 [preauth] Jan 13 05:54:27 host sshd[10079]: User root from 185.221.239.3 not allowed because not listed in AllowUsers Jan 13 05:54:27 host sshd[10079]: input_userauth_request: invalid user root [preauth] Jan 13 05:54:27 host unix_chkpwd[10083]: password check failed for user (root) Jan 13 05:54:27 host sshd[10079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.221.239.3 user=root Jan 13 05:54:27 host sshd[10079]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:54:29 host sshd[10079]: Failed password for invalid user root from 185.221.239.3 port 59280 ssh2 Jan 13 05:54:29 host sshd[10079]: Received disconnect from 185.221.239.3 port 59280:11: Bye Bye [preauth] Jan 13 05:54:29 host sshd[10079]: Disconnected from 185.221.239.3 port 59280 [preauth] Jan 13 05:54:42 host sshd[10256]: User root from 206.189.233.163 not allowed because not listed in AllowUsers Jan 13 05:54:42 host sshd[10256]: input_userauth_request: invalid user root [preauth] Jan 13 05:54:43 host unix_chkpwd[10259]: password check failed for user (root) Jan 13 05:54:43 host sshd[10256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.233.163 user=root Jan 13 05:54:43 host sshd[10256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:54:44 host sshd[10256]: Failed password for invalid user root from 206.189.233.163 port 44516 ssh2 Jan 13 05:54:44 host sshd[10256]: Received disconnect from 206.189.233.163 port 44516:11: Bye Bye [preauth] Jan 13 05:54:44 host sshd[10256]: Disconnected from 206.189.233.163 port 44516 [preauth] Jan 13 05:54:51 host sshd[10300]: User root from 190.64.136.124 not allowed because not listed in AllowUsers Jan 13 05:54:51 host sshd[10300]: input_userauth_request: invalid user root [preauth] Jan 13 05:54:51 host unix_chkpwd[10306]: password check failed for user (root) Jan 13 05:54:51 host sshd[10300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.136.124 user=root Jan 13 05:54:51 host sshd[10300]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:54:52 host sshd[10304]: User root from 187.217.117.3 not allowed because not listed in AllowUsers Jan 13 05:54:52 host sshd[10304]: input_userauth_request: invalid user root [preauth] Jan 13 05:54:52 host unix_chkpwd[10314]: password check failed for user (root) Jan 13 05:54:52 host sshd[10304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.117.3 user=root Jan 13 05:54:52 host sshd[10304]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:54:53 host sshd[10300]: Failed password for invalid user root from 190.64.136.124 port 47093 ssh2 Jan 13 05:54:54 host sshd[10304]: Failed password for invalid user root from 187.217.117.3 port 56938 ssh2 Jan 13 05:54:55 host sshd[10304]: Received disconnect from 187.217.117.3 port 56938:11: Bye Bye [preauth] Jan 13 05:54:55 host sshd[10304]: Disconnected from 187.217.117.3 port 56938 [preauth] Jan 13 05:54:59 host sshd[10379]: User root from 95.167.178.44 not allowed because not listed in AllowUsers Jan 13 05:54:59 host sshd[10379]: input_userauth_request: invalid user root [preauth] Jan 13 05:54:59 host unix_chkpwd[10385]: password check failed for user (root) Jan 13 05:54:59 host sshd[10379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.178.44 user=root Jan 13 05:54:59 host sshd[10379]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:55:00 host sshd[10382]: User root from 51.91.151.44 not allowed because not listed in AllowUsers Jan 13 05:55:00 host sshd[10382]: input_userauth_request: invalid user root [preauth] Jan 13 05:55:00 host unix_chkpwd[10388]: password check failed for user (root) Jan 13 05:55:00 host sshd[10382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.151.44 user=root Jan 13 05:55:00 host sshd[10382]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:55:01 host sshd[10386]: User root from 198.211.121.90 not allowed because not listed in AllowUsers Jan 13 05:55:01 host sshd[10386]: input_userauth_request: invalid user root [preauth] Jan 13 05:55:01 host unix_chkpwd[10391]: password check failed for user (root) Jan 13 05:55:01 host sshd[10386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.121.90 user=root Jan 13 05:55:01 host sshd[10386]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:55:01 host sshd[10382]: Failed password for invalid user root from 51.91.151.44 port 45138 ssh2 Jan 13 05:55:02 host sshd[10382]: Received disconnect from 51.91.151.44 port 45138:11: Bye Bye [preauth] Jan 13 05:55:02 host sshd[10382]: Disconnected from 51.91.151.44 port 45138 [preauth] Jan 13 05:55:02 host sshd[10379]: Failed password for invalid user root from 95.167.178.44 port 50586 ssh2 Jan 13 05:55:02 host sshd[10379]: Received disconnect from 95.167.178.44 port 50586:11: Bye Bye [preauth] Jan 13 05:55:02 host sshd[10379]: Disconnected from 95.167.178.44 port 50586 [preauth] Jan 13 05:55:03 host sshd[10386]: Failed password for invalid user root from 198.211.121.90 port 39818 ssh2 Jan 13 05:55:16 host sshd[10530]: User root from 52.170.31.174 not allowed because not listed in AllowUsers Jan 13 05:55:16 host sshd[10530]: input_userauth_request: invalid user root [preauth] Jan 13 05:55:16 host unix_chkpwd[10534]: password check failed for user (root) Jan 13 05:55:16 host sshd[10530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.31.174 user=root Jan 13 05:55:16 host sshd[10530]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:55:17 host sshd[10533]: User root from 137.184.120.104 not allowed because not listed in AllowUsers Jan 13 05:55:17 host sshd[10533]: input_userauth_request: invalid user root [preauth] Jan 13 05:55:17 host unix_chkpwd[10568]: password check failed for user (root) Jan 13 05:55:17 host sshd[10533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.120.104 user=root Jan 13 05:55:17 host sshd[10533]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:55:18 host sshd[10530]: Failed password for invalid user root from 52.170.31.174 port 60538 ssh2 Jan 13 05:55:19 host sshd[10533]: Failed password for invalid user root from 137.184.120.104 port 49456 ssh2 Jan 13 05:55:20 host sshd[10533]: Received disconnect from 137.184.120.104 port 49456:11: Bye Bye [preauth] Jan 13 05:55:20 host sshd[10533]: Disconnected from 137.184.120.104 port 49456 [preauth] Jan 13 05:55:20 host sshd[10583]: User root from 45.55.64.209 not allowed because not listed in AllowUsers Jan 13 05:55:20 host sshd[10583]: input_userauth_request: invalid user root [preauth] Jan 13 05:55:20 host unix_chkpwd[10586]: password check failed for user (root) Jan 13 05:55:20 host sshd[10583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.64.209 user=root Jan 13 05:55:20 host sshd[10583]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:55:22 host sshd[10583]: Failed password for invalid user root from 45.55.64.209 port 65037 ssh2 Jan 13 05:55:27 host sshd[10655]: User root from 137.184.226.220 not allowed because not listed in AllowUsers Jan 13 05:55:27 host sshd[10655]: input_userauth_request: invalid user root [preauth] Jan 13 05:55:27 host unix_chkpwd[10658]: password check failed for user (root) Jan 13 05:55:27 host sshd[10655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.226.220 user=root Jan 13 05:55:27 host sshd[10655]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:55:30 host sshd[10655]: Failed password for invalid user root from 137.184.226.220 port 41568 ssh2 Jan 13 05:55:30 host sshd[10655]: Received disconnect from 137.184.226.220 port 41568:11: Bye Bye [preauth] Jan 13 05:55:30 host sshd[10655]: Disconnected from 137.184.226.220 port 41568 [preauth] Jan 13 05:55:31 host sshd[10683]: User root from 103.181.143.143 not allowed because not listed in AllowUsers Jan 13 05:55:31 host sshd[10683]: input_userauth_request: invalid user root [preauth] Jan 13 05:55:31 host unix_chkpwd[10686]: password check failed for user (root) Jan 13 05:55:31 host sshd[10683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.181.143.143 user=root Jan 13 05:55:31 host sshd[10683]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:55:33 host sshd[10683]: Failed password for invalid user root from 103.181.143.143 port 35722 ssh2 Jan 13 05:55:33 host sshd[10747]: User root from 159.65.2.149 not allowed because not listed in AllowUsers Jan 13 05:55:33 host sshd[10747]: input_userauth_request: invalid user root [preauth] Jan 13 05:55:33 host unix_chkpwd[10749]: password check failed for user (root) Jan 13 05:55:33 host sshd[10747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.2.149 user=root Jan 13 05:55:33 host sshd[10747]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:55:35 host sshd[10747]: Failed password for invalid user root from 159.65.2.149 port 52852 ssh2 Jan 13 05:55:35 host sshd[10747]: Received disconnect from 159.65.2.149 port 52852:11: Bye Bye [preauth] Jan 13 05:55:35 host sshd[10747]: Disconnected from 159.65.2.149 port 52852 [preauth] Jan 13 05:55:45 host sshd[10799]: User root from 77.220.55.118 not allowed because not listed in AllowUsers Jan 13 05:55:45 host sshd[10799]: input_userauth_request: invalid user root [preauth] Jan 13 05:55:45 host unix_chkpwd[10804]: password check failed for user (root) Jan 13 05:55:45 host sshd[10799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.220.55.118 user=root Jan 13 05:55:45 host sshd[10799]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:55:47 host sshd[10799]: Failed password for invalid user root from 77.220.55.118 port 41346 ssh2 Jan 13 05:55:47 host sshd[10799]: Received disconnect from 77.220.55.118 port 41346:11: Bye Bye [preauth] Jan 13 05:55:47 host sshd[10799]: Disconnected from 77.220.55.118 port 41346 [preauth] Jan 13 05:56:01 host sshd[10826]: User root from 177.126.216.120 not allowed because not listed in AllowUsers Jan 13 05:56:01 host sshd[10826]: input_userauth_request: invalid user root [preauth] Jan 13 05:56:02 host unix_chkpwd[10842]: password check failed for user (root) Jan 13 05:56:02 host sshd[10826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.126.216.120 user=root Jan 13 05:56:02 host sshd[10826]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:56:04 host sshd[10826]: Failed password for invalid user root from 177.126.216.120 port 41915 ssh2 Jan 13 05:56:25 host sshd[10925]: User root from 217.234.82.44 not allowed because not listed in AllowUsers Jan 13 05:56:25 host sshd[10925]: input_userauth_request: invalid user root [preauth] Jan 13 05:56:25 host unix_chkpwd[10930]: password check failed for user (root) Jan 13 05:56:25 host sshd[10925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.234.82.44 user=root Jan 13 05:56:25 host sshd[10925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:56:26 host sshd[10925]: Failed password for invalid user root from 217.234.82.44 port 38802 ssh2 Jan 13 05:56:27 host sshd[10925]: Received disconnect from 217.234.82.44 port 38802:11: Bye Bye [preauth] Jan 13 05:56:27 host sshd[10925]: Disconnected from 217.234.82.44 port 38802 [preauth] Jan 13 05:56:37 host sshd[11003]: User root from 80.91.167.80 not allowed because not listed in AllowUsers Jan 13 05:56:37 host sshd[11003]: input_userauth_request: invalid user root [preauth] Jan 13 05:56:37 host unix_chkpwd[11008]: password check failed for user (root) Jan 13 05:56:37 host sshd[11003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.91.167.80 user=root Jan 13 05:56:37 host sshd[11003]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:56:39 host sshd[11003]: Failed password for invalid user root from 80.91.167.80 port 51806 ssh2 Jan 13 05:56:39 host sshd[11003]: Received disconnect from 80.91.167.80 port 51806:11: Bye Bye [preauth] Jan 13 05:56:39 host sshd[11003]: Disconnected from 80.91.167.80 port 51806 [preauth] Jan 13 05:59:11 host sshd[11388]: User root from 77.220.55.118 not allowed because not listed in AllowUsers Jan 13 05:59:11 host sshd[11388]: input_userauth_request: invalid user root [preauth] Jan 13 05:59:11 host unix_chkpwd[11390]: password check failed for user (root) Jan 13 05:59:11 host sshd[11388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.220.55.118 user=root Jan 13 05:59:11 host sshd[11388]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 05:59:13 host sshd[11388]: Failed password for invalid user root from 77.220.55.118 port 36652 ssh2 Jan 13 06:02:42 host sshd[11964]: Invalid user inetsim from 205.185.113.129 port 50912 Jan 13 06:02:42 host sshd[11964]: input_userauth_request: invalid user inetsim [preauth] Jan 13 06:02:42 host sshd[11964]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:02:42 host sshd[11964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 13 06:02:44 host sshd[11964]: Failed password for invalid user inetsim from 205.185.113.129 port 50912 ssh2 Jan 13 06:02:44 host sshd[11964]: Connection closed by 205.185.113.129 port 50912 [preauth] Jan 13 06:03:44 host sshd[12103]: Invalid user ubuntu from 176.111.173.164 port 42964 Jan 13 06:03:44 host sshd[12103]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 06:03:44 host sshd[12103]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:03:44 host sshd[12103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.111.173.164 Jan 13 06:03:46 host sshd[12103]: Failed password for invalid user ubuntu from 176.111.173.164 port 42964 ssh2 Jan 13 06:03:49 host sshd[12103]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:03:51 host sshd[12103]: Failed password for invalid user ubuntu from 176.111.173.164 port 42964 ssh2 Jan 13 06:03:55 host sshd[12103]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:03:57 host sshd[12103]: Failed password for invalid user ubuntu from 176.111.173.164 port 42964 ssh2 Jan 13 06:04:00 host sshd[12103]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:04:02 host sshd[12103]: Failed password for invalid user ubuntu from 176.111.173.164 port 42964 ssh2 Jan 13 06:05:46 host sshd[12491]: Invalid user postgres from 125.229.136.194 port 34981 Jan 13 06:05:46 host sshd[12491]: input_userauth_request: invalid user postgres [preauth] Jan 13 06:05:46 host sshd[12491]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:05:46 host sshd[12491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.136.194 Jan 13 06:05:47 host sshd[12491]: Failed password for invalid user postgres from 125.229.136.194 port 34981 ssh2 Jan 13 06:05:48 host sshd[12491]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:05:49 host sshd[12491]: Failed password for invalid user postgres from 125.229.136.194 port 34981 ssh2 Jan 13 06:05:50 host sshd[12491]: Connection reset by 125.229.136.194 port 34981 [preauth] Jan 13 06:05:50 host sshd[12491]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.136.194 Jan 13 06:14:55 host sshd[13644]: Connection closed by 45.79.128.205 port 36570 [preauth] Jan 13 06:14:58 host sshd[13649]: Connection closed by 45.79.128.205 port 36574 [preauth] Jan 13 06:14:59 host sshd[13654]: Did not receive identification string from 45.79.128.205 port 36580 Jan 13 06:16:05 host sshd[13912]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 13 06:16:05 host sshd[13912]: input_userauth_request: invalid user root [preauth] Jan 13 06:16:05 host unix_chkpwd[13915]: password check failed for user (root) Jan 13 06:16:05 host sshd[13912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 13 06:16:05 host sshd[13912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 06:16:07 host sshd[13912]: Failed password for invalid user root from 209.141.55.27 port 53472 ssh2 Jan 13 06:16:07 host sshd[13912]: Received disconnect from 209.141.55.27 port 53472:11: Normal Shutdown, Thank you for playing [preauth] Jan 13 06:16:07 host sshd[13912]: Disconnected from 209.141.55.27 port 53472 [preauth] Jan 13 06:18:12 host sshd[14241]: Invalid user support from 222.112.172.240 port 42480 Jan 13 06:18:12 host sshd[14241]: input_userauth_request: invalid user support [preauth] Jan 13 06:18:12 host sshd[14241]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:18:12 host sshd[14241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.172.240 Jan 13 06:18:14 host sshd[14241]: Failed password for invalid user support from 222.112.172.240 port 42480 ssh2 Jan 13 06:18:14 host sshd[14241]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:18:17 host sshd[14241]: Failed password for invalid user support from 222.112.172.240 port 42480 ssh2 Jan 13 06:18:18 host sshd[14241]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:18:20 host sshd[14241]: Failed password for invalid user support from 222.112.172.240 port 42480 ssh2 Jan 13 06:18:21 host sshd[14241]: Failed password for invalid user support from 222.112.172.240 port 42480 ssh2 Jan 13 06:18:22 host sshd[14241]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:18:24 host sshd[14241]: Failed password for invalid user support from 222.112.172.240 port 42480 ssh2 Jan 13 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=disposeat user-4=wwwkmaorg user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=palco123 user-17=gifterman user-18=phmetals user-19=kottayamcalldriv user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 06:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-h6yEQITZipPWdOgx.~ Jan 13 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-h6yEQITZipPWdOgx.~' Jan 13 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-h6yEQITZipPWdOgx.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 06:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 06:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 06:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 06:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 06:23:08 host sshd[15116]: Invalid user ubnt from 118.170.225.127 port 58720 Jan 13 06:23:08 host sshd[15116]: input_userauth_request: invalid user ubnt [preauth] Jan 13 06:23:08 host sshd[15116]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:23:08 host sshd[15116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.170.225.127 Jan 13 06:23:10 host sshd[15116]: Failed password for invalid user ubnt from 118.170.225.127 port 58720 ssh2 Jan 13 06:23:11 host sshd[15116]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:23:12 host sshd[15116]: Failed password for invalid user ubnt from 118.170.225.127 port 58720 ssh2 Jan 13 06:23:14 host sshd[15116]: Connection reset by 118.170.225.127 port 58720 [preauth] Jan 13 06:23:14 host sshd[15116]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.170.225.127 Jan 13 06:26:41 host sshd[15686]: Invalid user usr from 211.250.230.188 port 56488 Jan 13 06:26:41 host sshd[15686]: input_userauth_request: invalid user usr [preauth] Jan 13 06:26:41 host sshd[15686]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:26:41 host sshd[15686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.250.230.188 Jan 13 06:26:43 host sshd[15686]: Failed password for invalid user usr from 211.250.230.188 port 56488 ssh2 Jan 13 06:26:44 host sshd[15686]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:26:46 host sshd[15686]: Failed password for invalid user usr from 211.250.230.188 port 56488 ssh2 Jan 13 06:26:47 host sshd[15686]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:26:49 host sshd[15686]: Failed password for invalid user usr from 211.250.230.188 port 56488 ssh2 Jan 13 06:26:50 host sshd[15686]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:26:52 host sshd[15686]: Failed password for invalid user usr from 211.250.230.188 port 56488 ssh2 Jan 13 06:28:30 host sshd[15951]: Invalid user super from 59.15.102.226 port 61726 Jan 13 06:28:30 host sshd[15951]: input_userauth_request: invalid user super [preauth] Jan 13 06:28:30 host sshd[15951]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:28:30 host sshd[15951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.15.102.226 Jan 13 06:28:32 host sshd[15951]: Failed password for invalid user super from 59.15.102.226 port 61726 ssh2 Jan 13 06:28:33 host sshd[15951]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:28:35 host sshd[15951]: Failed password for invalid user super from 59.15.102.226 port 61726 ssh2 Jan 13 06:28:36 host sshd[15951]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:28:38 host sshd[15951]: Failed password for invalid user super from 59.15.102.226 port 61726 ssh2 Jan 13 06:28:38 host sshd[15951]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:28:40 host sshd[15951]: Failed password for invalid user super from 59.15.102.226 port 61726 ssh2 Jan 13 06:28:41 host sshd[15951]: Failed password for invalid user super from 59.15.102.226 port 61726 ssh2 Jan 13 06:30:23 host sshd[16318]: User ftp from 104.244.74.6 not allowed because not listed in AllowUsers Jan 13 06:30:23 host sshd[16318]: input_userauth_request: invalid user ftp [preauth] Jan 13 06:30:23 host unix_chkpwd[16323]: password check failed for user (ftp) Jan 13 06:30:23 host sshd[16318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 user=ftp Jan 13 06:30:23 host sshd[16318]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 13 06:30:25 host sshd[16318]: Failed password for invalid user ftp from 104.244.74.6 port 37514 ssh2 Jan 13 06:30:25 host sshd[16318]: Connection closed by 104.244.74.6 port 37514 [preauth] Jan 13 06:31:23 host sshd[16427]: Invalid user admin from 59.126.135.6 port 56933 Jan 13 06:31:23 host sshd[16427]: input_userauth_request: invalid user admin [preauth] Jan 13 06:31:23 host sshd[16427]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:31:23 host sshd[16427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.135.6 Jan 13 06:31:25 host sshd[16427]: Failed password for invalid user admin from 59.126.135.6 port 56933 ssh2 Jan 13 06:31:26 host sshd[16427]: Failed password for invalid user admin from 59.126.135.6 port 56933 ssh2 Jan 13 06:31:26 host sshd[16427]: Connection reset by 59.126.135.6 port 56933 [preauth] Jan 13 06:33:15 host sshd[16662]: User root from 139.130.129.86 not allowed because not listed in AllowUsers Jan 13 06:33:15 host sshd[16662]: input_userauth_request: invalid user root [preauth] Jan 13 06:33:15 host unix_chkpwd[16665]: password check failed for user (root) Jan 13 06:33:15 host sshd[16662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.130.129.86 user=root Jan 13 06:33:15 host sshd[16662]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 06:33:17 host sshd[16662]: Failed password for invalid user root from 139.130.129.86 port 51838 ssh2 Jan 13 06:33:18 host unix_chkpwd[16669]: password check failed for user (root) Jan 13 06:33:18 host sshd[16662]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 06:33:20 host sshd[16662]: Failed password for invalid user root from 139.130.129.86 port 51838 ssh2 Jan 13 06:33:20 host sshd[16662]: Connection reset by 139.130.129.86 port 51838 [preauth] Jan 13 06:33:20 host sshd[16662]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.130.129.86 user=root Jan 13 06:34:17 host sshd[16895]: User ftp from 104.244.74.6 not allowed because not listed in AllowUsers Jan 13 06:34:17 host sshd[16895]: input_userauth_request: invalid user ftp [preauth] Jan 13 06:34:17 host unix_chkpwd[16899]: password check failed for user (ftp) Jan 13 06:34:17 host sshd[16895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 user=ftp Jan 13 06:34:17 host sshd[16895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 13 06:34:20 host sshd[16895]: Failed password for invalid user ftp from 104.244.74.6 port 51074 ssh2 Jan 13 06:39:23 host sshd[17575]: Invalid user admin from 1.34.76.34 port 42089 Jan 13 06:39:23 host sshd[17575]: input_userauth_request: invalid user admin [preauth] Jan 13 06:39:23 host sshd[17575]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:39:23 host sshd[17575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.76.34 Jan 13 06:39:26 host sshd[17575]: Failed password for invalid user admin from 1.34.76.34 port 42089 ssh2 Jan 13 06:39:26 host sshd[17575]: Connection reset by 1.34.76.34 port 42089 [preauth] Jan 13 06:42:59 host sshd[18150]: Connection reset by 221.167.150.91 port 63949 [preauth] Jan 13 06:47:38 host sshd[18925]: Invalid user osmc from 37.206.55.50 port 45064 Jan 13 06:47:38 host sshd[18925]: input_userauth_request: invalid user osmc [preauth] Jan 13 06:47:38 host sshd[18925]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:47:38 host sshd[18925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.206.55.50 Jan 13 06:47:41 host sshd[18925]: Failed password for invalid user osmc from 37.206.55.50 port 45064 ssh2 Jan 13 06:47:41 host sshd[18925]: Connection closed by 37.206.55.50 port 45064 [preauth] Jan 13 06:51:07 host sshd[19338]: User root from 211.227.97.39 not allowed because not listed in AllowUsers Jan 13 06:51:07 host sshd[19338]: input_userauth_request: invalid user root [preauth] Jan 13 06:51:07 host unix_chkpwd[19342]: password check failed for user (root) Jan 13 06:51:07 host sshd[19338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.227.97.39 user=root Jan 13 06:51:07 host sshd[19338]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 06:51:09 host sshd[19338]: Failed password for invalid user root from 211.227.97.39 port 35544 ssh2 Jan 13 06:51:10 host unix_chkpwd[19346]: password check failed for user (root) Jan 13 06:51:10 host sshd[19338]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 06:51:12 host sshd[19338]: Failed password for invalid user root from 211.227.97.39 port 35544 ssh2 Jan 13 06:51:12 host unix_chkpwd[19350]: password check failed for user (root) Jan 13 06:51:12 host sshd[19338]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 06:51:14 host sshd[19338]: Failed password for invalid user root from 211.227.97.39 port 35544 ssh2 Jan 13 06:51:15 host unix_chkpwd[19355]: password check failed for user (root) Jan 13 06:51:15 host sshd[19338]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 06:51:18 host sshd[19338]: Failed password for invalid user root from 211.227.97.39 port 35544 ssh2 Jan 13 06:55:30 host sshd[20030]: Invalid user dh from 194.110.203.109 port 39098 Jan 13 06:55:30 host sshd[20030]: input_userauth_request: invalid user dh [preauth] Jan 13 06:55:30 host sshd[20030]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:55:30 host sshd[20030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 06:55:31 host sshd[20030]: Failed password for invalid user dh from 194.110.203.109 port 39098 ssh2 Jan 13 06:55:35 host sshd[20030]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:55:36 host sshd[20030]: Failed password for invalid user dh from 194.110.203.109 port 39098 ssh2 Jan 13 06:55:39 host sshd[20030]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:55:41 host sshd[20030]: Failed password for invalid user dh from 194.110.203.109 port 39098 ssh2 Jan 13 06:55:44 host sshd[20030]: Connection closed by 194.110.203.109 port 39098 [preauth] Jan 13 06:55:44 host sshd[20030]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 06:59:00 host sshd[20573]: Invalid user pi from 210.6.160.250 port 39037 Jan 13 06:59:00 host sshd[20573]: input_userauth_request: invalid user pi [preauth] Jan 13 06:59:00 host sshd[20573]: pam_unix(sshd:auth): check pass; user unknown Jan 13 06:59:00 host sshd[20573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.6.160.250 Jan 13 06:59:02 host sshd[20573]: Failed password for invalid user pi from 210.6.160.250 port 39037 ssh2 Jan 13 06:59:02 host sshd[20573]: Connection reset by 210.6.160.250 port 39037 [preauth] Jan 13 07:02:16 host sshd[21031]: Invalid user admin from 121.186.100.42 port 39069 Jan 13 07:02:16 host sshd[21031]: input_userauth_request: invalid user admin [preauth] Jan 13 07:02:16 host sshd[21031]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:02:16 host sshd[21031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.186.100.42 Jan 13 07:02:18 host sshd[21031]: Failed password for invalid user admin from 121.186.100.42 port 39069 ssh2 Jan 13 07:02:18 host sshd[21038]: Connection reset by 94.190.231.26 port 43455 [preauth] Jan 13 07:02:18 host sshd[21031]: Failed password for invalid user admin from 121.186.100.42 port 39069 ssh2 Jan 13 07:02:19 host sshd[21031]: Connection reset by 121.186.100.42 port 39069 [preauth] Jan 13 07:07:49 host sshd[21802]: Invalid user default from 175.206.163.184 port 39986 Jan 13 07:07:49 host sshd[21802]: input_userauth_request: invalid user default [preauth] Jan 13 07:07:49 host sshd[21802]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:07:49 host sshd[21802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.206.163.184 Jan 13 07:07:50 host sshd[21802]: Failed password for invalid user default from 175.206.163.184 port 39986 ssh2 Jan 13 07:07:51 host sshd[21802]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:07:53 host sshd[21802]: Failed password for invalid user default from 175.206.163.184 port 39986 ssh2 Jan 13 07:07:54 host sshd[21802]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:07:56 host sshd[21802]: Failed password for invalid user default from 175.206.163.184 port 39986 ssh2 Jan 13 07:07:57 host sshd[21802]: Connection reset by 175.206.163.184 port 39986 [preauth] Jan 13 07:07:57 host sshd[21802]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.206.163.184 Jan 13 07:11:19 host sshd[22335]: Invalid user henry from 209.141.56.48 port 58716 Jan 13 07:11:19 host sshd[22335]: input_userauth_request: invalid user henry [preauth] Jan 13 07:11:19 host sshd[22335]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:11:19 host sshd[22335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 13 07:11:21 host sshd[22335]: Failed password for invalid user henry from 209.141.56.48 port 58716 ssh2 Jan 13 07:11:21 host sshd[22335]: Connection closed by 209.141.56.48 port 58716 [preauth] Jan 13 07:17:15 host sshd[23174]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 13 07:17:15 host sshd[23174]: input_userauth_request: invalid user root [preauth] Jan 13 07:17:15 host unix_chkpwd[23178]: password check failed for user (root) Jan 13 07:17:15 host sshd[23174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 13 07:17:15 host sshd[23174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 07:17:17 host sshd[23174]: Failed password for invalid user root from 195.226.194.142 port 42072 ssh2 Jan 13 07:17:17 host sshd[23174]: Received disconnect from 195.226.194.142 port 42072:11: Bye Bye [preauth] Jan 13 07:17:17 host sshd[23174]: Disconnected from 195.226.194.142 port 42072 [preauth] Jan 13 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=wwwkmaorg user-17=disposeat user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=palco123 user-22=gifterman user-23=phmetals user-24=kottayamcalldriv user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 07:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jsSvSUV1x1PhlYXh.~ Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jsSvSUV1x1PhlYXh.~' Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jsSvSUV1x1PhlYXh.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 07:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 07:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 07:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 07:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 07:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 07:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 07:23:02 host sshd[24256]: Connection reset by 112.173.150.24 port 62891 [preauth] Jan 13 07:32:22 host sshd[25622]: Invalid user admin from 66.128.116.26 port 25986 Jan 13 07:32:22 host sshd[25622]: input_userauth_request: invalid user admin [preauth] Jan 13 07:32:23 host sshd[25622]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:32:23 host sshd[25622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.128.116.26 Jan 13 07:32:24 host sshd[25622]: Failed password for invalid user admin from 66.128.116.26 port 25986 ssh2 Jan 13 07:32:25 host sshd[25622]: Connection closed by 66.128.116.26 port 25986 [preauth] Jan 13 07:42:12 host sshd[27259]: Connection reset by 220.135.129.155 port 56088 [preauth] Jan 13 07:43:08 host sshd[27386]: Invalid user zyfwp from 60.251.57.154 port 36522 Jan 13 07:43:08 host sshd[27386]: input_userauth_request: invalid user zyfwp [preauth] Jan 13 07:43:08 host sshd[27386]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:43:08 host sshd[27386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.251.57.154 Jan 13 07:43:10 host sshd[27386]: Failed password for invalid user zyfwp from 60.251.57.154 port 36522 ssh2 Jan 13 07:43:11 host sshd[27386]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:43:13 host sshd[27386]: Failed password for invalid user zyfwp from 60.251.57.154 port 36522 ssh2 Jan 13 07:43:14 host sshd[27386]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:43:16 host sshd[27386]: Failed password for invalid user zyfwp from 60.251.57.154 port 36522 ssh2 Jan 13 07:43:16 host sshd[27386]: Connection closed by 60.251.57.154 port 36522 [preauth] Jan 13 07:43:16 host sshd[27386]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.251.57.154 Jan 13 07:47:23 host sshd[28318]: User root from 211.21.157.151 not allowed because not listed in AllowUsers Jan 13 07:47:23 host sshd[28318]: input_userauth_request: invalid user root [preauth] Jan 13 07:47:23 host sshd[28322]: Did not receive identification string from 139.155.69.82 port 43344 Jan 13 07:47:23 host unix_chkpwd[28321]: password check failed for user (root) Jan 13 07:47:23 host sshd[28318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.21.157.151 user=root Jan 13 07:47:23 host sshd[28318]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 07:47:25 host sshd[28318]: Failed password for invalid user root from 211.21.157.151 port 53034 ssh2 Jan 13 07:47:25 host unix_chkpwd[28325]: password check failed for user (root) Jan 13 07:47:25 host sshd[28318]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 07:47:27 host sshd[28318]: Failed password for invalid user root from 211.21.157.151 port 53034 ssh2 Jan 13 07:47:27 host unix_chkpwd[28328]: password check failed for user (root) Jan 13 07:47:27 host sshd[28318]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 07:47:29 host sshd[28318]: Failed password for invalid user root from 211.21.157.151 port 53034 ssh2 Jan 13 07:47:29 host sshd[28318]: Connection reset by 211.21.157.151 port 53034 [preauth] Jan 13 07:47:29 host sshd[28318]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.21.157.151 user=root Jan 13 07:47:39 host sshd[28392]: Invalid user dockeradmin from 139.155.69.82 port 45314 Jan 13 07:47:39 host sshd[28392]: input_userauth_request: invalid user dockeradmin [preauth] Jan 13 07:47:40 host sshd[28391]: Invalid user admin from 139.155.69.82 port 45320 Jan 13 07:47:40 host sshd[28391]: input_userauth_request: invalid user admin [preauth] Jan 13 07:47:40 host sshd[28392]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:47:40 host sshd[28392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.82 Jan 13 07:47:40 host sshd[28391]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:47:40 host sshd[28391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.82 Jan 13 07:47:41 host sshd[28394]: Invalid user user from 139.155.69.82 port 45304 Jan 13 07:47:41 host sshd[28394]: input_userauth_request: invalid user user [preauth] Jan 13 07:47:41 host sshd[28394]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:47:41 host sshd[28394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.82 Jan 13 07:47:41 host sshd[28352]: Invalid user es from 139.155.69.82 port 45382 Jan 13 07:47:41 host sshd[28352]: input_userauth_request: invalid user es [preauth] Jan 13 07:47:42 host sshd[28392]: Failed password for invalid user dockeradmin from 139.155.69.82 port 45314 ssh2 Jan 13 07:47:42 host sshd[28352]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:47:42 host sshd[28352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.82 Jan 13 07:47:42 host sshd[28391]: Failed password for invalid user admin from 139.155.69.82 port 45320 ssh2 Jan 13 07:47:42 host sshd[28392]: Connection closed by 139.155.69.82 port 45314 [preauth] Jan 13 07:47:42 host sshd[28391]: Connection closed by 139.155.69.82 port 45320 [preauth] Jan 13 07:47:43 host sshd[28409]: Invalid user user from 139.155.69.82 port 45310 Jan 13 07:47:43 host sshd[28409]: input_userauth_request: invalid user user [preauth] Jan 13 07:47:43 host sshd[28408]: User root from 139.155.69.82 not allowed because not listed in AllowUsers Jan 13 07:47:43 host sshd[28408]: input_userauth_request: invalid user root [preauth] Jan 13 07:47:43 host sshd[28409]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:47:43 host sshd[28409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.82 Jan 13 07:47:43 host unix_chkpwd[28421]: password check failed for user (root) Jan 13 07:47:43 host sshd[28408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.82 user=root Jan 13 07:47:43 host sshd[28408]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 07:47:43 host sshd[28352]: Failed password for invalid user es from 139.155.69.82 port 45382 ssh2 Jan 13 07:47:44 host sshd[28394]: Failed password for invalid user user from 139.155.69.82 port 45304 ssh2 Jan 13 07:47:44 host sshd[28352]: Connection closed by 139.155.69.82 port 45382 [preauth] Jan 13 07:47:44 host sshd[28394]: Connection closed by 139.155.69.82 port 45304 [preauth] Jan 13 07:47:44 host sshd[28401]: Invalid user admin from 139.155.69.82 port 45306 Jan 13 07:47:44 host sshd[28401]: input_userauth_request: invalid user admin [preauth] Jan 13 07:47:44 host sshd[28410]: User root from 139.155.69.82 not allowed because not listed in AllowUsers Jan 13 07:47:44 host sshd[28410]: input_userauth_request: invalid user root [preauth] Jan 13 07:47:44 host sshd[28402]: Invalid user admin from 139.155.69.82 port 45322 Jan 13 07:47:44 host sshd[28402]: input_userauth_request: invalid user admin [preauth] Jan 13 07:47:45 host sshd[28401]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:47:45 host sshd[28401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.82 Jan 13 07:47:45 host sshd[28402]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:47:45 host sshd[28402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.82 Jan 13 07:47:45 host unix_chkpwd[28423]: password check failed for user (root) Jan 13 07:47:45 host sshd[28410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.82 user=root Jan 13 07:47:45 host sshd[28410]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 07:47:45 host sshd[28409]: Failed password for invalid user user from 139.155.69.82 port 45310 ssh2 Jan 13 07:47:45 host sshd[28408]: Failed password for invalid user root from 139.155.69.82 port 45308 ssh2 Jan 13 07:47:45 host sshd[28409]: Connection closed by 139.155.69.82 port 45310 [preauth] Jan 13 07:47:45 host sshd[28408]: Connection closed by 139.155.69.82 port 45308 [preauth] Jan 13 07:47:47 host sshd[28401]: Failed password for invalid user admin from 139.155.69.82 port 45306 ssh2 Jan 13 07:47:47 host sshd[28402]: Failed password for invalid user admin from 139.155.69.82 port 45322 ssh2 Jan 13 07:47:47 host sshd[28410]: Failed password for invalid user root from 139.155.69.82 port 45316 ssh2 Jan 13 07:47:58 host sshd[28468]: Invalid user admin from 195.226.194.142 port 46628 Jan 13 07:47:58 host sshd[28468]: input_userauth_request: invalid user admin [preauth] Jan 13 07:47:58 host sshd[28468]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:47:58 host sshd[28468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 13 07:48:00 host sshd[28468]: Failed password for invalid user admin from 195.226.194.142 port 46628 ssh2 Jan 13 07:48:00 host sshd[28468]: Received disconnect from 195.226.194.142 port 46628:11: Bye Bye [preauth] Jan 13 07:48:00 host sshd[28468]: Disconnected from 195.226.194.142 port 46628 [preauth] Jan 13 07:49:59 host sshd[28856]: Invalid user gitlab-runner from 1.54.12.10 port 46411 Jan 13 07:49:59 host sshd[28856]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 13 07:49:59 host sshd[28856]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:49:59 host sshd[28856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.54.12.10 Jan 13 07:50:00 host sshd[28859]: Did not receive identification string from 196.179.238.249 port 42362 Jan 13 07:50:01 host sshd[28856]: Failed password for invalid user gitlab-runner from 1.54.12.10 port 46411 ssh2 Jan 13 07:50:01 host sshd[28856]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:50:03 host sshd[28856]: Failed password for invalid user gitlab-runner from 1.54.12.10 port 46411 ssh2 Jan 13 07:50:03 host sshd[28856]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:50:06 host sshd[28856]: Failed password for invalid user gitlab-runner from 1.54.12.10 port 46411 ssh2 Jan 13 07:50:06 host sshd[28856]: Failed password for invalid user gitlab-runner from 1.54.12.10 port 46411 ssh2 Jan 13 07:50:06 host sshd[28856]: Connection closed by 1.54.12.10 port 46411 [preauth] Jan 13 07:50:06 host sshd[28856]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.54.12.10 Jan 13 07:50:37 host sshd[29028]: Invalid user admin from 196.179.238.249 port 39698 Jan 13 07:50:37 host sshd[29028]: input_userauth_request: invalid user admin [preauth] Jan 13 07:50:37 host sshd[29028]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:50:37 host sshd[29028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.238.249 Jan 13 07:50:39 host sshd[29028]: Failed password for invalid user admin from 196.179.238.249 port 39698 ssh2 Jan 13 07:50:39 host sshd[29028]: Connection closed by 196.179.238.249 port 39698 [preauth] Jan 13 07:51:29 host sshd[29128]: Invalid user admin from 196.179.238.249 port 58626 Jan 13 07:51:29 host sshd[29128]: input_userauth_request: invalid user admin [preauth] Jan 13 07:51:29 host sshd[29128]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:51:29 host sshd[29128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.238.249 Jan 13 07:51:31 host sshd[29128]: Failed password for invalid user admin from 196.179.238.249 port 58626 ssh2 Jan 13 07:51:31 host sshd[29128]: Connection closed by 196.179.238.249 port 58626 [preauth] Jan 13 07:54:25 host sshd[29513]: Invalid user admin from 59.127.79.91 port 56344 Jan 13 07:54:25 host sshd[29513]: input_userauth_request: invalid user admin [preauth] Jan 13 07:54:25 host sshd[29513]: pam_unix(sshd:auth): check pass; user unknown Jan 13 07:54:25 host sshd[29513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.79.91 Jan 13 07:54:27 host sshd[29513]: Failed password for invalid user admin from 59.127.79.91 port 56344 ssh2 Jan 13 07:54:28 host sshd[29513]: Failed password for invalid user admin from 59.127.79.91 port 56344 ssh2 Jan 13 07:54:28 host sshd[29513]: Connection reset by 59.127.79.91 port 56344 [preauth] Jan 13 07:58:00 host sshd[30105]: Connection reset by 121.131.134.165 port 56662 [preauth] Jan 13 08:00:35 host sshd[30546]: Invalid user admin from 220.135.245.227 port 56717 Jan 13 08:00:35 host sshd[30546]: input_userauth_request: invalid user admin [preauth] Jan 13 08:00:35 host sshd[30546]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:00:35 host sshd[30546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.245.227 Jan 13 08:00:37 host sshd[30546]: Failed password for invalid user admin from 220.135.245.227 port 56717 ssh2 Jan 13 08:00:38 host sshd[30546]: Connection reset by 220.135.245.227 port 56717 [preauth] Jan 13 08:11:34 host sshd[32372]: Invalid user ubnt from 211.23.217.240 port 36096 Jan 13 08:11:34 host sshd[32372]: input_userauth_request: invalid user ubnt [preauth] Jan 13 08:11:34 host sshd[32372]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:11:34 host sshd[32372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.23.217.240 Jan 13 08:11:37 host sshd[32372]: Failed password for invalid user ubnt from 211.23.217.240 port 36096 ssh2 Jan 13 08:11:37 host sshd[32372]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:11:38 host sshd[32372]: Failed password for invalid user ubnt from 211.23.217.240 port 36096 ssh2 Jan 13 08:11:39 host sshd[32372]: Connection reset by 211.23.217.240 port 36096 [preauth] Jan 13 08:11:39 host sshd[32372]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.23.217.240 Jan 13 08:16:09 host sshd[628]: Invalid user nexidigital from 159.89.185.234 port 42602 Jan 13 08:16:09 host sshd[628]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 08:16:09 host sshd[628]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:16:09 host sshd[628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 08:16:12 host sshd[628]: Failed password for invalid user nexidigital from 159.89.185.234 port 42602 ssh2 Jan 13 08:16:15 host sshd[628]: Connection closed by 159.89.185.234 port 42602 [preauth] Jan 13 08:16:55 host sshd[724]: User root from 151.192.199.147 not allowed because not listed in AllowUsers Jan 13 08:16:55 host sshd[724]: input_userauth_request: invalid user root [preauth] Jan 13 08:16:55 host unix_chkpwd[727]: password check failed for user (root) Jan 13 08:16:55 host sshd[724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.192.199.147 user=root Jan 13 08:16:55 host sshd[724]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 08:16:57 host sshd[724]: Failed password for invalid user root from 151.192.199.147 port 56271 ssh2 Jan 13 08:16:57 host unix_chkpwd[732]: password check failed for user (root) Jan 13 08:16:57 host sshd[724]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 08:17:00 host sshd[724]: Failed password for invalid user root from 151.192.199.147 port 56271 ssh2 Jan 13 08:17:00 host sshd[734]: Invalid user RPM from 104.236.165.32 port 29654 Jan 13 08:17:00 host sshd[734]: input_userauth_request: invalid user RPM [preauth] Jan 13 08:17:00 host sshd[734]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:17:00 host sshd[734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.165.32 Jan 13 08:17:02 host sshd[734]: Failed password for invalid user RPM from 104.236.165.32 port 29654 ssh2 Jan 13 08:17:03 host sshd[734]: Connection closed by 104.236.165.32 port 29654 [preauth] Jan 13 08:17:45 host sshd[848]: Invalid user admin from 14.133.52.46 port 43430 Jan 13 08:17:45 host sshd[848]: input_userauth_request: invalid user admin [preauth] Jan 13 08:17:45 host sshd[848]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:17:45 host sshd[848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.133.52.46 Jan 13 08:17:47 host sshd[848]: Failed password for invalid user admin from 14.133.52.46 port 43430 ssh2 Jan 13 08:17:48 host sshd[848]: Failed password for invalid user admin from 14.133.52.46 port 43430 ssh2 Jan 13 08:17:48 host sshd[848]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:17:50 host sshd[848]: Failed password for invalid user admin from 14.133.52.46 port 43430 ssh2 Jan 13 08:18:14 host sshd[848]: Connection closed by 14.133.52.46 port 43430 [preauth] Jan 13 08:18:14 host sshd[848]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.133.52.46 Jan 13 08:18:37 host sshd[980]: Invalid user admin from 116.241.101.186 port 59562 Jan 13 08:18:37 host sshd[980]: input_userauth_request: invalid user admin [preauth] Jan 13 08:18:37 host sshd[980]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:18:37 host sshd[980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.241.101.186 Jan 13 08:18:39 host sshd[980]: Failed password for invalid user admin from 116.241.101.186 port 59562 ssh2 Jan 13 08:18:41 host sshd[980]: Failed password for invalid user admin from 116.241.101.186 port 59562 ssh2 Jan 13 08:18:41 host sshd[980]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:18:42 host sshd[980]: Failed password for invalid user admin from 116.241.101.186 port 59562 ssh2 Jan 13 08:18:43 host sshd[980]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:18:45 host sshd[980]: Failed password for invalid user admin from 116.241.101.186 port 59562 ssh2 Jan 13 08:18:45 host sshd[980]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:18:48 host sshd[980]: Failed password for invalid user admin from 116.241.101.186 port 59562 ssh2 Jan 13 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=kottayamcalldriv user-19=phmetals user-20=gifterman user-21=palco123 user-22=wwwkapin user-23=woodpeck user-24=wwwkmaorg user-25=remysagr user-26=disposeat user-27=pmcresources user-28=wwwtestugo user-29=shalinijames user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 08:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sdeCPGu30jLg1lj6.~ Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sdeCPGu30jLg1lj6.~' Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sdeCPGu30jLg1lj6.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 08:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 08:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 08:22:08 host sshd[1788]: User root from 61.82.205.196 not allowed because not listed in AllowUsers Jan 13 08:22:08 host sshd[1788]: input_userauth_request: invalid user root [preauth] Jan 13 08:22:08 host unix_chkpwd[1804]: password check failed for user (root) Jan 13 08:22:08 host sshd[1788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.82.205.196 user=root Jan 13 08:22:08 host sshd[1788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 08:22:09 host sshd[1788]: Failed password for invalid user root from 61.82.205.196 port 63701 ssh2 Jan 13 08:22:11 host sshd[1788]: Connection reset by 61.82.205.196 port 63701 [preauth] Jan 13 08:27:41 host sshd[2748]: User root from 125.139.29.234 not allowed because not listed in AllowUsers Jan 13 08:27:41 host sshd[2748]: input_userauth_request: invalid user root [preauth] Jan 13 08:27:41 host unix_chkpwd[2752]: password check failed for user (root) Jan 13 08:27:41 host sshd[2748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.139.29.234 user=root Jan 13 08:27:41 host sshd[2748]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 08:27:43 host sshd[2748]: Failed password for invalid user root from 125.139.29.234 port 37171 ssh2 Jan 13 08:27:44 host unix_chkpwd[2757]: password check failed for user (root) Jan 13 08:27:44 host sshd[2748]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 08:27:46 host sshd[2748]: Failed password for invalid user root from 125.139.29.234 port 37171 ssh2 Jan 13 08:27:46 host sshd[2748]: Connection reset by 125.139.29.234 port 37171 [preauth] Jan 13 08:27:46 host sshd[2748]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.139.29.234 user=root Jan 13 08:29:32 host sshd[2996]: User root from 221.154.208.233 not allowed because not listed in AllowUsers Jan 13 08:29:32 host sshd[2996]: input_userauth_request: invalid user root [preauth] Jan 13 08:29:32 host unix_chkpwd[3000]: password check failed for user (root) Jan 13 08:29:32 host sshd[2996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.154.208.233 user=root Jan 13 08:29:32 host sshd[2996]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 08:29:33 host sshd[2996]: Failed password for invalid user root from 221.154.208.233 port 62552 ssh2 Jan 13 08:29:34 host unix_chkpwd[3005]: password check failed for user (root) Jan 13 08:29:34 host sshd[2996]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 08:29:36 host sshd[2996]: Failed password for invalid user root from 221.154.208.233 port 62552 ssh2 Jan 13 08:29:37 host unix_chkpwd[3009]: password check failed for user (root) Jan 13 08:29:37 host sshd[2996]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 08:29:39 host sshd[2996]: Failed password for invalid user root from 221.154.208.233 port 62552 ssh2 Jan 13 08:29:40 host unix_chkpwd[3013]: password check failed for user (root) Jan 13 08:29:40 host sshd[2996]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 08:29:42 host sshd[2996]: Failed password for invalid user root from 221.154.208.233 port 62552 ssh2 Jan 13 08:29:43 host unix_chkpwd[3022]: password check failed for user (root) Jan 13 08:29:43 host sshd[2996]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 08:29:44 host sshd[2996]: Failed password for invalid user root from 221.154.208.233 port 62552 ssh2 Jan 13 08:34:27 host sshd[3702]: Invalid user ONTUSER from 110.141.63.158 port 55313 Jan 13 08:34:27 host sshd[3702]: input_userauth_request: invalid user ONTUSER [preauth] Jan 13 08:34:27 host sshd[3702]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:34:27 host sshd[3702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.141.63.158 Jan 13 08:34:29 host sshd[3702]: Failed password for invalid user ONTUSER from 110.141.63.158 port 55313 ssh2 Jan 13 08:34:30 host sshd[3702]: Connection reset by 110.141.63.158 port 55313 [preauth] Jan 13 08:36:41 host sshd[4084]: Invalid user ubnt from 192.72.18.114 port 53545 Jan 13 08:36:41 host sshd[4084]: input_userauth_request: invalid user ubnt [preauth] Jan 13 08:36:41 host sshd[4084]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:36:41 host sshd[4084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.72.18.114 Jan 13 08:36:43 host sshd[4084]: Failed password for invalid user ubnt from 192.72.18.114 port 53545 ssh2 Jan 13 08:36:44 host sshd[4084]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:36:45 host sshd[4084]: Failed password for invalid user ubnt from 192.72.18.114 port 53545 ssh2 Jan 13 08:36:46 host sshd[4084]: Failed password for invalid user ubnt from 192.72.18.114 port 53545 ssh2 Jan 13 08:36:47 host sshd[4084]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:36:49 host sshd[4084]: Failed password for invalid user ubnt from 192.72.18.114 port 53545 ssh2 Jan 13 08:36:49 host sshd[4084]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:36:51 host sshd[4084]: Failed password for invalid user ubnt from 192.72.18.114 port 53545 ssh2 Jan 13 08:36:52 host sshd[4084]: Connection reset by 192.72.18.114 port 53545 [preauth] Jan 13 08:36:52 host sshd[4084]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.72.18.114 Jan 13 08:36:52 host sshd[4084]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 13 08:38:42 host sshd[4365]: User root from 175.207.230.234 not allowed because not listed in AllowUsers Jan 13 08:38:42 host sshd[4365]: input_userauth_request: invalid user root [preauth] Jan 13 08:38:42 host unix_chkpwd[4369]: password check failed for user (root) Jan 13 08:38:42 host sshd[4365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.230.234 user=root Jan 13 08:38:42 host sshd[4365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 08:38:44 host sshd[4365]: Failed password for invalid user root from 175.207.230.234 port 50410 ssh2 Jan 13 08:38:44 host sshd[4365]: Connection reset by 175.207.230.234 port 50410 [preauth] Jan 13 08:45:04 host sshd[5221]: Invalid user di from 194.110.203.109 port 33436 Jan 13 08:45:04 host sshd[5221]: input_userauth_request: invalid user di [preauth] Jan 13 08:45:04 host sshd[5221]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:45:04 host sshd[5221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 08:45:06 host sshd[5221]: Failed password for invalid user di from 194.110.203.109 port 33436 ssh2 Jan 13 08:45:09 host sshd[5221]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:45:11 host sshd[5221]: Failed password for invalid user di from 194.110.203.109 port 33436 ssh2 Jan 13 08:45:14 host sshd[5221]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:45:16 host sshd[5221]: Failed password for invalid user di from 194.110.203.109 port 33436 ssh2 Jan 13 08:45:19 host sshd[5221]: Connection closed by 194.110.203.109 port 33436 [preauth] Jan 13 08:45:19 host sshd[5221]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 08:47:09 host sshd[5506]: User ftp from 175.210.123.211 not allowed because not listed in AllowUsers Jan 13 08:47:09 host sshd[5506]: input_userauth_request: invalid user ftp [preauth] Jan 13 08:47:09 host unix_chkpwd[5513]: password check failed for user (ftp) Jan 13 08:47:09 host sshd[5506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.210.123.211 user=ftp Jan 13 08:47:09 host sshd[5506]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 13 08:47:11 host sshd[5506]: Failed password for invalid user ftp from 175.210.123.211 port 62511 ssh2 Jan 13 08:47:12 host sshd[5506]: Connection reset by 175.210.123.211 port 62511 [preauth] Jan 13 08:59:18 host sshd[7279]: Invalid user ec2-user from 36.233.172.72 port 41154 Jan 13 08:59:18 host sshd[7279]: input_userauth_request: invalid user ec2-user [preauth] Jan 13 08:59:18 host sshd[7279]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:59:18 host sshd[7279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.233.172.72 Jan 13 08:59:20 host sshd[7279]: Failed password for invalid user ec2-user from 36.233.172.72 port 41154 ssh2 Jan 13 08:59:22 host sshd[7279]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:59:24 host sshd[7279]: Failed password for invalid user ec2-user from 36.233.172.72 port 41154 ssh2 Jan 13 08:59:25 host sshd[7279]: pam_unix(sshd:auth): check pass; user unknown Jan 13 08:59:28 host sshd[7279]: Failed password for invalid user ec2-user from 36.233.172.72 port 41154 ssh2 Jan 13 08:59:28 host sshd[7279]: Connection reset by 36.233.172.72 port 41154 [preauth] Jan 13 08:59:28 host sshd[7279]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.233.172.72 Jan 13 09:03:43 host sshd[7848]: Did not receive identification string from 92.255.85.115 port 33177 Jan 13 09:05:59 host sshd[8229]: Invalid user vadmin from 122.117.33.133 port 38451 Jan 13 09:05:59 host sshd[8229]: input_userauth_request: invalid user vadmin [preauth] Jan 13 09:05:59 host sshd[8229]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:05:59 host sshd[8229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.33.133 Jan 13 09:06:01 host sshd[8229]: Failed password for invalid user vadmin from 122.117.33.133 port 38451 ssh2 Jan 13 09:06:02 host sshd[8229]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:06:04 host sshd[8229]: Failed password for invalid user vadmin from 122.117.33.133 port 38451 ssh2 Jan 13 09:06:04 host sshd[8229]: Failed password for invalid user vadmin from 122.117.33.133 port 38451 ssh2 Jan 13 09:06:05 host sshd[8229]: Connection closed by 122.117.33.133 port 38451 [preauth] Jan 13 09:06:05 host sshd[8229]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.33.133 Jan 13 09:09:44 host sshd[8768]: Invalid user admin from 175.205.33.61 port 60816 Jan 13 09:09:44 host sshd[8768]: input_userauth_request: invalid user admin [preauth] Jan 13 09:09:44 host sshd[8768]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:09:44 host sshd[8768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.205.33.61 Jan 13 09:09:46 host sshd[8768]: Failed password for invalid user admin from 175.205.33.61 port 60816 ssh2 Jan 13 09:09:47 host sshd[8768]: Failed password for invalid user admin from 175.205.33.61 port 60816 ssh2 Jan 13 09:09:47 host sshd[8768]: Connection reset by 175.205.33.61 port 60816 [preauth] Jan 13 09:13:02 host sshd[9335]: Did not receive identification string from 119.91.61.108 port 60324 Jan 13 09:13:04 host sshd[9345]: User root from 119.91.61.108 not allowed because not listed in AllowUsers Jan 13 09:13:04 host sshd[9345]: input_userauth_request: invalid user root [preauth] Jan 13 09:13:04 host sshd[9361]: Invalid user user from 119.91.61.108 port 39932 Jan 13 09:13:04 host sshd[9361]: input_userauth_request: invalid user user [preauth] Jan 13 09:13:04 host sshd[9341]: User centos from 119.91.61.108 not allowed because not listed in AllowUsers Jan 13 09:13:04 host sshd[9341]: input_userauth_request: invalid user centos [preauth] Jan 13 09:13:04 host sshd[9342]: Invalid user www from 119.91.61.108 port 39966 Jan 13 09:13:04 host sshd[9342]: input_userauth_request: invalid user www [preauth] Jan 13 09:13:04 host unix_chkpwd[9375]: password check failed for user (root) Jan 13 09:13:04 host sshd[9345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 user=root Jan 13 09:13:04 host sshd[9345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:13:04 host sshd[9339]: Invalid user admin from 119.91.61.108 port 39900 Jan 13 09:13:04 host sshd[9339]: input_userauth_request: invalid user admin [preauth] Jan 13 09:13:04 host sshd[9344]: Invalid user guest from 119.91.61.108 port 39974 Jan 13 09:13:04 host sshd[9344]: input_userauth_request: invalid user guest [preauth] Jan 13 09:13:04 host sshd[9349]: Invalid user pi from 119.91.61.108 port 39916 Jan 13 09:13:04 host sshd[9349]: input_userauth_request: invalid user pi [preauth] Jan 13 09:13:04 host sshd[9361]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:04 host sshd[9361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:05 host sshd[9338]: Invalid user oracle from 119.91.61.108 port 39968 Jan 13 09:13:05 host sshd[9338]: input_userauth_request: invalid user oracle [preauth] Jan 13 09:13:05 host sshd[9337]: Invalid user postgres from 119.91.61.108 port 39912 Jan 13 09:13:05 host sshd[9337]: input_userauth_request: invalid user postgres [preauth] Jan 13 09:13:05 host sshd[9360]: User root from 119.91.61.108 not allowed because not listed in AllowUsers Jan 13 09:13:05 host sshd[9360]: input_userauth_request: invalid user root [preauth] Jan 13 09:13:05 host sshd[9339]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:05 host sshd[9339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:05 host unix_chkpwd[9376]: password check failed for user (centos) Jan 13 09:13:05 host sshd[9341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 user=centos Jan 13 09:13:05 host sshd[9342]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:05 host sshd[9342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:05 host sshd[9340]: Invalid user emqx from 119.91.61.108 port 39906 Jan 13 09:13:05 host sshd[9340]: input_userauth_request: invalid user emqx [preauth] Jan 13 09:13:05 host sshd[9349]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:05 host sshd[9349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:05 host sshd[9365]: Invalid user ubnt from 119.91.61.108 port 39926 Jan 13 09:13:05 host sshd[9365]: input_userauth_request: invalid user ubnt [preauth] Jan 13 09:13:05 host sshd[9367]: Invalid user oracle from 119.91.61.108 port 39958 Jan 13 09:13:05 host sshd[9367]: input_userauth_request: invalid user oracle [preauth] Jan 13 09:13:05 host sshd[9338]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:05 host sshd[9338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:05 host unix_chkpwd[9378]: password check failed for user (root) Jan 13 09:13:05 host sshd[9360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 user=root Jan 13 09:13:05 host sshd[9360]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:13:05 host sshd[9340]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:05 host sshd[9340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:05 host sshd[9343]: Invalid user dmdba from 119.91.61.108 port 39946 Jan 13 09:13:05 host sshd[9343]: input_userauth_request: invalid user dmdba [preauth] Jan 13 09:13:05 host sshd[9365]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:05 host sshd[9365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:05 host sshd[9372]: Invalid user testuser from 119.91.61.108 port 39910 Jan 13 09:13:05 host sshd[9372]: input_userauth_request: invalid user testuser [preauth] Jan 13 09:13:05 host sshd[9336]: Invalid user ubuntu from 119.91.61.108 port 39954 Jan 13 09:13:05 host sshd[9336]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 09:13:06 host sshd[9343]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:06 host sshd[9343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:06 host sshd[9336]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:06 host sshd[9336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:06 host sshd[9367]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:06 host sshd[9367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:06 host sshd[9344]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:06 host sshd[9344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:06 host sshd[9345]: Failed password for invalid user root from 119.91.61.108 port 39920 ssh2 Jan 13 09:13:06 host sshd[9361]: Failed password for invalid user user from 119.91.61.108 port 39932 ssh2 Jan 13 09:13:07 host sshd[9337]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:07 host sshd[9337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:07 host sshd[9345]: Connection closed by 119.91.61.108 port 39920 [preauth] Jan 13 09:13:07 host sshd[9372]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:07 host sshd[9372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:07 host sshd[9361]: Connection closed by 119.91.61.108 port 39932 [preauth] Jan 13 09:13:07 host sshd[9339]: Failed password for invalid user admin from 119.91.61.108 port 39900 ssh2 Jan 13 09:13:07 host sshd[9341]: Failed password for invalid user centos from 119.91.61.108 port 39902 ssh2 Jan 13 09:13:07 host sshd[9342]: Failed password for invalid user www from 119.91.61.108 port 39966 ssh2 Jan 13 09:13:07 host sshd[9343]: Failed password for invalid user dmdba from 119.91.61.108 port 39946 ssh2 Jan 13 09:13:07 host sshd[9349]: Failed password for invalid user pi from 119.91.61.108 port 39916 ssh2 Jan 13 09:13:08 host sshd[9379]: Invalid user user from 119.91.61.108 port 39918 Jan 13 09:13:08 host sshd[9379]: input_userauth_request: invalid user user [preauth] Jan 13 09:13:08 host sshd[9338]: Failed password for invalid user oracle from 119.91.61.108 port 39968 ssh2 Jan 13 09:13:08 host sshd[9336]: Failed password for invalid user ubuntu from 119.91.61.108 port 39954 ssh2 Jan 13 09:13:08 host sshd[9341]: Connection closed by 119.91.61.108 port 39902 [preauth] Jan 13 09:13:08 host sshd[9342]: Connection closed by 119.91.61.108 port 39966 [preauth] Jan 13 09:13:08 host sshd[9360]: Failed password for invalid user root from 119.91.61.108 port 39940 ssh2 Jan 13 09:13:08 host sshd[9340]: Failed password for invalid user emqx from 119.91.61.108 port 39906 ssh2 Jan 13 09:13:08 host sshd[9343]: Connection closed by 119.91.61.108 port 39946 [preauth] Jan 13 09:13:08 host sshd[9349]: Connection closed by 119.91.61.108 port 39916 [preauth] Jan 13 09:13:08 host sshd[9367]: Failed password for invalid user oracle from 119.91.61.108 port 39958 ssh2 Jan 13 09:13:08 host sshd[9365]: Failed password for invalid user ubnt from 119.91.61.108 port 39926 ssh2 Jan 13 09:13:08 host sshd[9338]: Connection closed by 119.91.61.108 port 39968 [preauth] Jan 13 09:13:08 host sshd[9344]: Failed password for invalid user guest from 119.91.61.108 port 39974 ssh2 Jan 13 09:13:08 host sshd[9336]: Connection closed by 119.91.61.108 port 39954 [preauth] Jan 13 09:13:08 host sshd[9360]: Connection closed by 119.91.61.108 port 39940 [preauth] Jan 13 09:13:08 host sshd[9337]: Failed password for invalid user postgres from 119.91.61.108 port 39912 ssh2 Jan 13 09:13:08 host sshd[9367]: Connection closed by 119.91.61.108 port 39958 [preauth] Jan 13 09:13:08 host sshd[9365]: Connection closed by 119.91.61.108 port 39926 [preauth] Jan 13 09:13:08 host sshd[9372]: Failed password for invalid user testuser from 119.91.61.108 port 39910 ssh2 Jan 13 09:13:09 host sshd[9344]: Connection closed by 119.91.61.108 port 39974 [preauth] Jan 13 09:13:09 host sshd[9339]: Connection closed by 119.91.61.108 port 39900 [preauth] Jan 13 09:13:09 host sshd[9337]: Connection closed by 119.91.61.108 port 39912 [preauth] Jan 13 09:13:09 host sshd[9372]: Connection closed by 119.91.61.108 port 39910 [preauth] Jan 13 09:13:09 host sshd[9340]: Connection closed by 119.91.61.108 port 39906 [preauth] Jan 13 09:13:09 host sshd[9379]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:13:09 host sshd[9379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 Jan 13 09:13:09 host sshd[9369]: User root from 119.91.61.108 not allowed because not listed in AllowUsers Jan 13 09:13:09 host sshd[9369]: input_userauth_request: invalid user root [preauth] Jan 13 09:13:10 host unix_chkpwd[9414]: password check failed for user (root) Jan 13 09:13:10 host sshd[9369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.91.61.108 user=root Jan 13 09:13:10 host sshd[9369]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:13:10 host sshd[9380]: Invalid user esuser from 119.91.61.108 port 39922 Jan 13 09:13:10 host sshd[9380]: input_userauth_request: invalid user esuser [preauth] Jan 13 09:13:11 host sshd[9379]: Failed password for invalid user user from 119.91.61.108 port 39918 ssh2 Jan 13 09:13:12 host sshd[9369]: Failed password for invalid user root from 119.91.61.108 port 39950 ssh2 Jan 13 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=remysagr user-3=disposeat user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 09:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Ly0IOIXWYOqsVnty.~ Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Ly0IOIXWYOqsVnty.~' Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Ly0IOIXWYOqsVnty.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 09:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 09:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 09:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 09:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 09:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 09:22:52 host sshd[11142]: User root from 111.253.205.19 not allowed because not listed in AllowUsers Jan 13 09:22:52 host sshd[11142]: input_userauth_request: invalid user root [preauth] Jan 13 09:22:52 host unix_chkpwd[11149]: password check failed for user (root) Jan 13 09:22:52 host sshd[11142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.253.205.19 user=root Jan 13 09:22:52 host sshd[11142]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:22:54 host sshd[11142]: Failed password for invalid user root from 111.253.205.19 port 36659 ssh2 Jan 13 09:22:55 host unix_chkpwd[11153]: password check failed for user (root) Jan 13 09:22:55 host sshd[11142]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:22:56 host sshd[11142]: Failed password for invalid user root from 111.253.205.19 port 36659 ssh2 Jan 13 09:22:57 host unix_chkpwd[11160]: password check failed for user (root) Jan 13 09:22:57 host sshd[11142]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:22:59 host sshd[11142]: Failed password for invalid user root from 111.253.205.19 port 36659 ssh2 Jan 13 09:22:59 host sshd[11142]: Connection reset by 111.253.205.19 port 36659 [preauth] Jan 13 09:22:59 host sshd[11142]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.253.205.19 user=root Jan 13 09:23:42 host sshd[11306]: Invalid user admin from 218.154.70.197 port 56657 Jan 13 09:23:42 host sshd[11306]: input_userauth_request: invalid user admin [preauth] Jan 13 09:23:42 host sshd[11306]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:23:42 host sshd[11306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.154.70.197 Jan 13 09:23:44 host sshd[11306]: Failed password for invalid user admin from 218.154.70.197 port 56657 ssh2 Jan 13 09:23:45 host sshd[11306]: Failed password for invalid user admin from 218.154.70.197 port 56657 ssh2 Jan 13 09:23:45 host sshd[11306]: Connection reset by 218.154.70.197 port 56657 [preauth] Jan 13 09:31:22 host sshd[12466]: Invalid user ONTUSER from 59.126.241.148 port 47041 Jan 13 09:31:22 host sshd[12466]: input_userauth_request: invalid user ONTUSER [preauth] Jan 13 09:31:22 host sshd[12466]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:31:22 host sshd[12466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.241.148 Jan 13 09:31:24 host sshd[12466]: Failed password for invalid user ONTUSER from 59.126.241.148 port 47041 ssh2 Jan 13 09:31:26 host sshd[12466]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:31:27 host sshd[12466]: Failed password for invalid user ONTUSER from 59.126.241.148 port 47041 ssh2 Jan 13 09:31:28 host sshd[12466]: Failed password for invalid user ONTUSER from 59.126.241.148 port 47041 ssh2 Jan 13 09:31:29 host sshd[12466]: Connection closed by 59.126.241.148 port 47041 [preauth] Jan 13 09:31:29 host sshd[12466]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.241.148 Jan 13 09:32:10 host sshd[12586]: Did not receive identification string from 46.101.97.107 port 61000 Jan 13 09:36:16 host sshd[13331]: User root from 62.211.136.21 not allowed because not listed in AllowUsers Jan 13 09:36:16 host sshd[13331]: input_userauth_request: invalid user root [preauth] Jan 13 09:36:16 host unix_chkpwd[13335]: password check failed for user (root) Jan 13 09:36:16 host sshd[13331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.211.136.21 user=root Jan 13 09:36:16 host sshd[13331]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:36:19 host sshd[13331]: Failed password for invalid user root from 62.211.136.21 port 55590 ssh2 Jan 13 09:36:19 host unix_chkpwd[13339]: password check failed for user (root) Jan 13 09:36:19 host sshd[13331]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:36:21 host sshd[13331]: Failed password for invalid user root from 62.211.136.21 port 55590 ssh2 Jan 13 09:36:22 host unix_chkpwd[13345]: password check failed for user (root) Jan 13 09:36:22 host sshd[13331]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:36:23 host sshd[13331]: Failed password for invalid user root from 62.211.136.21 port 55590 ssh2 Jan 13 09:36:24 host unix_chkpwd[13349]: password check failed for user (root) Jan 13 09:36:24 host sshd[13331]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:36:26 host sshd[13331]: Failed password for invalid user root from 62.211.136.21 port 55590 ssh2 Jan 13 09:38:49 host sshd[13790]: Invalid user nexidigital from 159.89.185.234 port 45560 Jan 13 09:38:49 host sshd[13790]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 09:38:49 host sshd[13790]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:38:49 host sshd[13790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 09:38:51 host sshd[13790]: Failed password for invalid user nexidigital from 159.89.185.234 port 45560 ssh2 Jan 13 09:38:52 host sshd[13790]: Connection closed by 159.89.185.234 port 45560 [preauth] Jan 13 09:42:21 host sshd[14310]: User root from 221.147.58.148 not allowed because not listed in AllowUsers Jan 13 09:42:21 host sshd[14310]: input_userauth_request: invalid user root [preauth] Jan 13 09:42:21 host unix_chkpwd[14314]: password check failed for user (root) Jan 13 09:42:21 host sshd[14310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.147.58.148 user=root Jan 13 09:42:21 host sshd[14310]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:42:23 host sshd[14310]: Failed password for invalid user root from 221.147.58.148 port 61420 ssh2 Jan 13 09:42:24 host sshd[14310]: Connection reset by 221.147.58.148 port 61420 [preauth] Jan 13 09:43:15 host sshd[14451]: User ftp from 114.33.86.130 not allowed because not listed in AllowUsers Jan 13 09:43:15 host sshd[14451]: input_userauth_request: invalid user ftp [preauth] Jan 13 09:43:15 host unix_chkpwd[14458]: password check failed for user (ftp) Jan 13 09:43:15 host sshd[14451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.86.130 user=ftp Jan 13 09:43:15 host sshd[14451]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 13 09:43:17 host sshd[14451]: Failed password for invalid user ftp from 114.33.86.130 port 39047 ssh2 Jan 13 09:43:18 host sshd[14451]: Connection reset by 114.33.86.130 port 39047 [preauth] Jan 13 09:47:03 host sshd[15126]: User root from 117.102.197.12 not allowed because not listed in AllowUsers Jan 13 09:47:03 host sshd[15126]: input_userauth_request: invalid user root [preauth] Jan 13 09:47:03 host unix_chkpwd[15144]: password check failed for user (root) Jan 13 09:47:03 host sshd[15126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.197.12 user=root Jan 13 09:47:03 host sshd[15126]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 09:47:05 host sshd[15126]: Failed password for invalid user root from 117.102.197.12 port 62516 ssh2 Jan 13 09:47:06 host sshd[15126]: Connection closed by 117.102.197.12 port 62516 [preauth] Jan 13 09:52:11 host sshd[16098]: Invalid user bzrx1098ui from 92.255.85.115 port 28973 Jan 13 09:52:11 host sshd[16098]: input_userauth_request: invalid user bzrx1098ui [preauth] Jan 13 09:52:11 host sshd[16098]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:52:11 host sshd[16098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 13 09:52:13 host sshd[16098]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 28973 ssh2 Jan 13 09:52:13 host sshd[16098]: Connection reset by 92.255.85.115 port 28973 [preauth] Jan 13 09:52:27 host sshd[16118]: Invalid user user from 221.165.128.115 port 54586 Jan 13 09:52:27 host sshd[16118]: input_userauth_request: invalid user user [preauth] Jan 13 09:52:27 host sshd[16118]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:52:27 host sshd[16118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.165.128.115 Jan 13 09:52:28 host sshd[16118]: Failed password for invalid user user from 221.165.128.115 port 54586 ssh2 Jan 13 09:52:29 host sshd[16118]: Connection reset by 221.165.128.115 port 54586 [preauth] Jan 13 09:55:13 host sshd[16554]: Invalid user henry from 209.141.56.48 port 36666 Jan 13 09:55:13 host sshd[16554]: input_userauth_request: invalid user henry [preauth] Jan 13 09:55:13 host sshd[16554]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:55:13 host sshd[16554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 13 09:55:15 host sshd[16554]: Failed password for invalid user henry from 209.141.56.48 port 36666 ssh2 Jan 13 09:55:15 host sshd[16554]: Connection closed by 209.141.56.48 port 36666 [preauth] Jan 13 09:58:56 host sshd[17024]: Invalid user pi from 59.126.148.59 port 48798 Jan 13 09:58:56 host sshd[17024]: input_userauth_request: invalid user pi [preauth] Jan 13 09:58:56 host sshd[17024]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:58:56 host sshd[17024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.148.59 Jan 13 09:58:58 host sshd[17024]: Failed password for invalid user pi from 59.126.148.59 port 48798 ssh2 Jan 13 09:58:59 host sshd[17024]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:59:01 host sshd[17024]: Failed password for invalid user pi from 59.126.148.59 port 48798 ssh2 Jan 13 09:59:02 host sshd[17024]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:59:04 host sshd[17024]: Failed password for invalid user pi from 59.126.148.59 port 48798 ssh2 Jan 13 09:59:04 host sshd[17024]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:59:06 host sshd[17024]: Failed password for invalid user pi from 59.126.148.59 port 48798 ssh2 Jan 13 09:59:07 host sshd[17024]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:59:09 host sshd[17024]: Failed password for invalid user pi from 59.126.148.59 port 48798 ssh2 Jan 13 09:59:10 host sshd[17024]: pam_unix(sshd:auth): check pass; user unknown Jan 13 09:59:12 host sshd[17024]: Failed password for invalid user pi from 59.126.148.59 port 48798 ssh2 Jan 13 09:59:12 host sshd[17024]: error: maximum authentication attempts exceeded for invalid user pi from 59.126.148.59 port 48798 ssh2 [preauth] Jan 13 09:59:12 host sshd[17024]: Disconnecting: Too many authentication failures [preauth] Jan 13 09:59:12 host sshd[17024]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.148.59 Jan 13 09:59:12 host sshd[17024]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 13 10:02:52 host sshd[17638]: Invalid user admin from 92.255.85.115 port 16541 Jan 13 10:02:52 host sshd[17638]: input_userauth_request: invalid user admin [preauth] Jan 13 10:02:52 host sshd[17638]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:02:52 host sshd[17638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 13 10:02:54 host sshd[17638]: Failed password for invalid user admin from 92.255.85.115 port 16541 ssh2 Jan 13 10:02:55 host sshd[17638]: Connection reset by 92.255.85.115 port 16541 [preauth] Jan 13 10:06:17 host sshd[18204]: Invalid user bill from 205.185.113.129 port 37372 Jan 13 10:06:17 host sshd[18204]: input_userauth_request: invalid user bill [preauth] Jan 13 10:06:17 host sshd[18204]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:06:17 host sshd[18204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 13 10:06:18 host sshd[18204]: Failed password for invalid user bill from 205.185.113.129 port 37372 ssh2 Jan 13 10:06:19 host sshd[18204]: Connection closed by 205.185.113.129 port 37372 [preauth] Jan 13 10:11:08 host sshd[18953]: Invalid user oracle from 109.228.253.237 port 40947 Jan 13 10:11:08 host sshd[18953]: input_userauth_request: invalid user oracle [preauth] Jan 13 10:11:08 host sshd[18953]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:11:08 host sshd[18953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.228.253.237 Jan 13 10:11:10 host sshd[18953]: Failed password for invalid user oracle from 109.228.253.237 port 40947 ssh2 Jan 13 10:11:10 host sshd[18953]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:11:12 host sshd[18953]: Failed password for invalid user oracle from 109.228.253.237 port 40947 ssh2 Jan 13 10:11:13 host sshd[18953]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:11:15 host sshd[18953]: Failed password for invalid user oracle from 109.228.253.237 port 40947 ssh2 Jan 13 10:11:16 host sshd[18953]: Failed password for invalid user oracle from 109.228.253.237 port 40947 ssh2 Jan 13 10:11:16 host sshd[18953]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:11:19 host sshd[18953]: Failed password for invalid user oracle from 109.228.253.237 port 40947 ssh2 Jan 13 10:15:41 host sshd[19683]: User root from 218.161.45.197 not allowed because not listed in AllowUsers Jan 13 10:15:41 host sshd[19683]: input_userauth_request: invalid user root [preauth] Jan 13 10:15:41 host unix_chkpwd[19692]: password check failed for user (root) Jan 13 10:15:41 host sshd[19683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.161.45.197 user=root Jan 13 10:15:41 host sshd[19683]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 10:15:43 host sshd[19683]: Failed password for invalid user root from 218.161.45.197 port 56430 ssh2 Jan 13 10:15:46 host unix_chkpwd[19804]: password check failed for user (root) Jan 13 10:15:46 host sshd[19683]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 10:15:48 host sshd[19683]: Failed password for invalid user root from 218.161.45.197 port 56430 ssh2 Jan 13 10:15:50 host unix_chkpwd[19809]: password check failed for user (root) Jan 13 10:15:50 host sshd[19683]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 10:15:51 host sshd[19683]: Failed password for invalid user root from 218.161.45.197 port 56430 ssh2 Jan 13 10:18:23 host sshd[20155]: User root from 183.106.168.158 not allowed because not listed in AllowUsers Jan 13 10:18:23 host sshd[20155]: input_userauth_request: invalid user root [preauth] Jan 13 10:18:23 host unix_chkpwd[20162]: password check failed for user (root) Jan 13 10:18:23 host sshd[20155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.106.168.158 user=root Jan 13 10:18:23 host sshd[20155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 10:18:25 host sshd[20155]: Failed password for invalid user root from 183.106.168.158 port 61085 ssh2 Jan 13 10:18:26 host unix_chkpwd[20165]: password check failed for user (root) Jan 13 10:18:26 host sshd[20155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 10:18:28 host sshd[20155]: Failed password for invalid user root from 183.106.168.158 port 61085 ssh2 Jan 13 10:18:29 host unix_chkpwd[20198]: password check failed for user (root) Jan 13 10:18:29 host sshd[20155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 10:18:31 host sshd[20155]: Failed password for invalid user root from 183.106.168.158 port 61085 ssh2 Jan 13 10:18:31 host sshd[20155]: Connection reset by 183.106.168.158 port 61085 [preauth] Jan 13 10:18:31 host sshd[20155]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.106.168.158 user=root Jan 13 10:18:42 host sshd[20244]: Invalid user odroid from 195.226.194.242 port 32196 Jan 13 10:18:42 host sshd[20244]: input_userauth_request: invalid user odroid [preauth] Jan 13 10:18:42 host sshd[20244]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:18:42 host sshd[20244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 13 10:18:44 host sshd[20244]: Failed password for invalid user odroid from 195.226.194.242 port 32196 ssh2 Jan 13 10:18:45 host sshd[20244]: Received disconnect from 195.226.194.242 port 32196:11: Bye Bye [preauth] Jan 13 10:18:45 host sshd[20244]: Disconnected from 195.226.194.242 port 32196 [preauth] Jan 13 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwresourcehunte user-3=keralaholi user-4=wwwrmswll user-5=ugotscom user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=wwwletsstalkfood user-13=straightcurve user-14=bonifacegroup user-15=wwwevmhonda user-16=wwwnexidigital user-17=mrsclean user-18=palco123 user-19=gifterman user-20=phmetals user-21=kottayamcalldriv user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=shalinijames user-30=wwwtestugo feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 10:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GsEGFQ85MHFXE2tA.~ Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GsEGFQ85MHFXE2tA.~' Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GsEGFQ85MHFXE2tA.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 10:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 10:25:21 host sshd[21455]: Invalid user henry from 209.141.56.48 port 41480 Jan 13 10:25:21 host sshd[21455]: input_userauth_request: invalid user henry [preauth] Jan 13 10:25:21 host sshd[21455]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:25:21 host sshd[21455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 13 10:25:23 host sshd[21455]: Failed password for invalid user henry from 209.141.56.48 port 41480 ssh2 Jan 13 10:25:24 host sshd[21455]: Connection closed by 209.141.56.48 port 41480 [preauth] Jan 13 10:29:37 host sshd[22172]: Invalid user shawn from 107.189.30.59 port 43800 Jan 13 10:29:37 host sshd[22172]: input_userauth_request: invalid user shawn [preauth] Jan 13 10:29:37 host sshd[22172]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:29:37 host sshd[22172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 13 10:29:39 host sshd[22172]: Failed password for invalid user shawn from 107.189.30.59 port 43800 ssh2 Jan 13 10:29:40 host sshd[22172]: Connection closed by 107.189.30.59 port 43800 [preauth] Jan 13 10:32:53 host sshd[22686]: Invalid user dj from 194.110.203.109 port 57780 Jan 13 10:32:53 host sshd[22686]: input_userauth_request: invalid user dj [preauth] Jan 13 10:32:53 host sshd[22686]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:32:53 host sshd[22686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 10:32:55 host sshd[22686]: Failed password for invalid user dj from 194.110.203.109 port 57780 ssh2 Jan 13 10:32:58 host sshd[22686]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:33:00 host sshd[22686]: Failed password for invalid user dj from 194.110.203.109 port 57780 ssh2 Jan 13 10:33:04 host sshd[22686]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:33:06 host sshd[22686]: Failed password for invalid user dj from 194.110.203.109 port 57780 ssh2 Jan 13 10:33:09 host sshd[22686]: Connection closed by 194.110.203.109 port 57780 [preauth] Jan 13 10:33:09 host sshd[22686]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 10:37:07 host sshd[23389]: Did not receive identification string from 43.138.16.192 port 32840 Jan 13 10:37:09 host sshd[23391]: Invalid user bot from 43.138.16.192 port 37794 Jan 13 10:37:09 host sshd[23391]: input_userauth_request: invalid user bot [preauth] Jan 13 10:37:09 host sshd[23400]: Invalid user guest from 43.138.16.192 port 37796 Jan 13 10:37:09 host sshd[23400]: input_userauth_request: invalid user guest [preauth] Jan 13 10:37:09 host sshd[23402]: Invalid user deployer from 43.138.16.192 port 37792 Jan 13 10:37:09 host sshd[23402]: input_userauth_request: invalid user deployer [preauth] Jan 13 10:37:10 host sshd[23418]: User centos from 43.138.16.192 not allowed because not listed in AllowUsers Jan 13 10:37:10 host sshd[23418]: input_userauth_request: invalid user centos [preauth] Jan 13 10:37:10 host sshd[23391]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:37:10 host sshd[23391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.16.192 Jan 13 10:37:10 host sshd[23400]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:37:10 host sshd[23400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.16.192 Jan 13 10:37:10 host sshd[23402]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:37:10 host sshd[23402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.16.192 Jan 13 10:37:10 host unix_chkpwd[23447]: password check failed for user (centos) Jan 13 10:37:10 host sshd[23418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.16.192 user=centos Jan 13 10:37:10 host sshd[23415]: Invalid user gitlab-runner from 43.138.16.192 port 37790 Jan 13 10:37:10 host sshd[23415]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 13 10:37:11 host sshd[23398]: Invalid user systems from 43.138.16.192 port 37760 Jan 13 10:37:11 host sshd[23398]: input_userauth_request: invalid user systems [preauth] Jan 13 10:37:11 host sshd[23415]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:37:11 host sshd[23415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.16.192 Jan 13 10:37:11 host sshd[23405]: Invalid user ubuntu from 43.138.16.192 port 37784 Jan 13 10:37:11 host sshd[23405]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 10:37:11 host sshd[23398]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:37:11 host sshd[23398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.16.192 Jan 13 10:37:11 host sshd[23425]: Invalid user mc from 43.138.16.192 port 37806 Jan 13 10:37:11 host sshd[23425]: input_userauth_request: invalid user mc [preauth] Jan 13 10:37:12 host sshd[23405]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:37:12 host sshd[23405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.16.192 Jan 13 10:37:12 host sshd[23391]: Failed password for invalid user bot from 43.138.16.192 port 37794 ssh2 Jan 13 10:37:12 host sshd[23400]: Failed password for invalid user guest from 43.138.16.192 port 37796 ssh2 Jan 13 10:37:12 host sshd[23402]: Failed password for invalid user deployer from 43.138.16.192 port 37792 ssh2 Jan 13 10:37:12 host sshd[23422]: Invalid user admin from 43.138.16.192 port 37752 Jan 13 10:37:12 host sshd[23422]: input_userauth_request: invalid user admin [preauth] Jan 13 10:37:12 host sshd[23418]: Failed password for invalid user centos from 43.138.16.192 port 37814 ssh2 Jan 13 10:37:12 host sshd[23431]: Invalid user casadiagnosis from 43.138.16.192 port 37764 Jan 13 10:37:12 host sshd[23431]: input_userauth_request: invalid user casadiagnosis [preauth] Jan 13 10:37:12 host sshd[23402]: Connection closed by 43.138.16.192 port 37792 [preauth] Jan 13 10:37:13 host sshd[23418]: Connection closed by 43.138.16.192 port 37814 [preauth] Jan 13 10:37:13 host sshd[23431]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:37:13 host sshd[23431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.16.192 Jan 13 10:37:13 host sshd[23425]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:37:13 host sshd[23425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.16.192 Jan 13 10:37:13 host sshd[23415]: Failed password for invalid user gitlab-runner from 43.138.16.192 port 37790 ssh2 Jan 13 10:37:13 host sshd[23398]: Failed password for invalid user systems from 43.138.16.192 port 37760 ssh2 Jan 13 10:37:14 host sshd[23431]: Failed password for invalid user casadiagnosis from 43.138.16.192 port 37764 ssh2 Jan 13 10:37:14 host sshd[23425]: Failed password for invalid user mc from 43.138.16.192 port 37806 ssh2 Jan 13 10:37:14 host sshd[23405]: Failed password for invalid user ubuntu from 43.138.16.192 port 37784 ssh2 Jan 13 10:40:36 host sshd[24232]: Invalid user admin from 220.134.174.229 port 39579 Jan 13 10:40:36 host sshd[24232]: input_userauth_request: invalid user admin [preauth] Jan 13 10:40:36 host sshd[24232]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:40:36 host sshd[24232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.174.229 Jan 13 10:40:38 host sshd[24232]: Failed password for invalid user admin from 220.134.174.229 port 39579 ssh2 Jan 13 10:40:39 host sshd[24232]: Failed password for invalid user admin from 220.134.174.229 port 39579 ssh2 Jan 13 10:40:40 host sshd[24232]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:40:42 host sshd[24232]: Failed password for invalid user admin from 220.134.174.229 port 39579 ssh2 Jan 13 10:40:42 host sshd[24232]: Connection reset by 220.134.174.229 port 39579 [preauth] Jan 13 10:40:42 host sshd[24232]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.174.229 Jan 13 10:54:45 host sshd[26974]: Invalid user vagrant from 125.229.90.200 port 42190 Jan 13 10:54:45 host sshd[26974]: input_userauth_request: invalid user vagrant [preauth] Jan 13 10:54:45 host sshd[26974]: pam_unix(sshd:auth): check pass; user unknown Jan 13 10:54:45 host sshd[26974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.90.200 Jan 13 10:54:48 host sshd[26974]: Failed password for invalid user vagrant from 125.229.90.200 port 42190 ssh2 Jan 13 10:54:49 host sshd[26974]: Failed password for invalid user vagrant from 125.229.90.200 port 42190 ssh2 Jan 13 10:54:49 host sshd[26974]: Connection closed by 125.229.90.200 port 42190 [preauth] Jan 13 11:01:44 host sshd[28097]: Invalid user nexidigital from 159.89.185.234 port 42350 Jan 13 11:01:44 host sshd[28097]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 11:01:44 host sshd[28097]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:01:44 host sshd[28097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 11:01:47 host sshd[28097]: Failed password for invalid user nexidigital from 159.89.185.234 port 42350 ssh2 Jan 13 11:01:48 host sshd[28097]: Connection closed by 159.89.185.234 port 42350 [preauth] Jan 13 11:06:00 host sshd[28829]: Invalid user henry from 209.141.56.48 port 40370 Jan 13 11:06:00 host sshd[28829]: input_userauth_request: invalid user henry [preauth] Jan 13 11:06:00 host sshd[28829]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:06:00 host sshd[28829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 13 11:06:02 host sshd[28829]: Failed password for invalid user henry from 209.141.56.48 port 40370 ssh2 Jan 13 11:06:02 host sshd[28829]: Connection closed by 209.141.56.48 port 40370 [preauth] Jan 13 11:06:33 host sshd[28915]: Invalid user henry from 209.141.56.48 port 60106 Jan 13 11:06:33 host sshd[28915]: input_userauth_request: invalid user henry [preauth] Jan 13 11:06:33 host sshd[28915]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:06:33 host sshd[28915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 13 11:06:35 host sshd[28915]: Failed password for invalid user henry from 209.141.56.48 port 60106 ssh2 Jan 13 11:10:04 host sshd[29733]: Invalid user admin from 221.153.23.30 port 60357 Jan 13 11:10:04 host sshd[29733]: input_userauth_request: invalid user admin [preauth] Jan 13 11:10:04 host sshd[29733]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:10:04 host sshd[29733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.153.23.30 Jan 13 11:10:06 host sshd[29733]: Failed password for invalid user admin from 221.153.23.30 port 60357 ssh2 Jan 13 11:10:07 host sshd[29733]: Failed password for invalid user admin from 221.153.23.30 port 60357 ssh2 Jan 13 11:10:07 host sshd[29733]: Connection reset by 221.153.23.30 port 60357 [preauth] Jan 13 11:11:06 host sshd[29839]: Invalid user vadmin from 59.126.159.136 port 52003 Jan 13 11:11:06 host sshd[29839]: input_userauth_request: invalid user vadmin [preauth] Jan 13 11:11:06 host sshd[29839]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:11:06 host sshd[29839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.159.136 Jan 13 11:11:07 host sshd[29839]: Failed password for invalid user vadmin from 59.126.159.136 port 52003 ssh2 Jan 13 11:11:09 host sshd[29839]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:11:11 host sshd[29839]: Failed password for invalid user vadmin from 59.126.159.136 port 52003 ssh2 Jan 13 11:11:12 host sshd[29839]: Connection reset by 59.126.159.136 port 52003 [preauth] Jan 13 11:11:12 host sshd[29839]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.159.136 Jan 13 11:13:15 host sshd[30085]: Invalid user ONTUSER from 122.117.32.154 port 57504 Jan 13 11:13:15 host sshd[30085]: input_userauth_request: invalid user ONTUSER [preauth] Jan 13 11:13:15 host sshd[30085]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:13:15 host sshd[30085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.32.154 Jan 13 11:13:17 host sshd[30085]: Failed password for invalid user ONTUSER from 122.117.32.154 port 57504 ssh2 Jan 13 11:13:18 host sshd[30085]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:13:20 host sshd[30085]: Failed password for invalid user ONTUSER from 122.117.32.154 port 57504 ssh2 Jan 13 11:13:21 host sshd[30085]: Failed password for invalid user ONTUSER from 122.117.32.154 port 57504 ssh2 Jan 13 11:13:22 host sshd[30085]: Connection closed by 122.117.32.154 port 57504 [preauth] Jan 13 11:13:22 host sshd[30085]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.32.154 Jan 13 11:13:45 host sshd[30163]: User root from 83.209.41.236 not allowed because not listed in AllowUsers Jan 13 11:13:45 host sshd[30163]: input_userauth_request: invalid user root [preauth] Jan 13 11:13:45 host unix_chkpwd[30166]: password check failed for user (root) Jan 13 11:13:45 host sshd[30163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.209.41.236 user=root Jan 13 11:13:45 host sshd[30163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:13:47 host sshd[30163]: Failed password for invalid user root from 83.209.41.236 port 39677 ssh2 Jan 13 11:13:47 host sshd[30163]: Received disconnect from 83.209.41.236 port 39677:11: Bye Bye [preauth] Jan 13 11:13:47 host sshd[30163]: Disconnected from 83.209.41.236 port 39677 [preauth] Jan 13 11:14:57 host sshd[30305]: User root from 89.100.208.17 not allowed because not listed in AllowUsers Jan 13 11:14:57 host sshd[30305]: input_userauth_request: invalid user root [preauth] Jan 13 11:14:57 host unix_chkpwd[30309]: password check failed for user (root) Jan 13 11:14:57 host sshd[30305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.208.17 user=root Jan 13 11:14:57 host sshd[30305]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:14:59 host sshd[30305]: Failed password for invalid user root from 89.100.208.17 port 54522 ssh2 Jan 13 11:14:59 host sshd[30305]: Received disconnect from 89.100.208.17 port 54522:11: Bye Bye [preauth] Jan 13 11:14:59 host sshd[30305]: Disconnected from 89.100.208.17 port 54522 [preauth] Jan 13 11:15:42 host sshd[30524]: Invalid user usr from 49.161.119.253 port 34461 Jan 13 11:15:42 host sshd[30524]: input_userauth_request: invalid user usr [preauth] Jan 13 11:15:43 host sshd[30524]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:15:43 host sshd[30524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.161.119.253 Jan 13 11:15:45 host sshd[30524]: Failed password for invalid user usr from 49.161.119.253 port 34461 ssh2 Jan 13 11:15:45 host sshd[30524]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:15:48 host sshd[30524]: Failed password for invalid user usr from 49.161.119.253 port 34461 ssh2 Jan 13 11:15:48 host sshd[30524]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:15:51 host sshd[30524]: Failed password for invalid user usr from 49.161.119.253 port 34461 ssh2 Jan 13 11:15:51 host sshd[30524]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:15:53 host sshd[30524]: Failed password for invalid user usr from 49.161.119.253 port 34461 ssh2 Jan 13 11:15:54 host sshd[30524]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:15:56 host sshd[30524]: Failed password for invalid user usr from 49.161.119.253 port 34461 ssh2 Jan 13 11:16:45 host sshd[30669]: User ftp from 175.206.102.7 not allowed because not listed in AllowUsers Jan 13 11:16:45 host sshd[30669]: input_userauth_request: invalid user ftp [preauth] Jan 13 11:16:45 host unix_chkpwd[30674]: password check failed for user (ftp) Jan 13 11:16:45 host sshd[30669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.206.102.7 user=ftp Jan 13 11:16:45 host sshd[30669]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 13 11:16:47 host sshd[30669]: Failed password for invalid user ftp from 175.206.102.7 port 62145 ssh2 Jan 13 11:16:48 host unix_chkpwd[30677]: password check failed for user (ftp) Jan 13 11:16:48 host sshd[30669]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 13 11:16:50 host sshd[30669]: Failed password for invalid user ftp from 175.206.102.7 port 62145 ssh2 Jan 13 11:16:51 host unix_chkpwd[30680]: password check failed for user (ftp) Jan 13 11:16:51 host sshd[30669]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 13 11:16:53 host sshd[30669]: Failed password for invalid user ftp from 175.206.102.7 port 62145 ssh2 Jan 13 11:17:58 host sshd[30832]: User root from 181.30.129.31 not allowed because not listed in AllowUsers Jan 13 11:17:58 host sshd[30832]: input_userauth_request: invalid user root [preauth] Jan 13 11:17:58 host unix_chkpwd[30836]: password check failed for user (root) Jan 13 11:17:58 host sshd[30832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.129.31 user=root Jan 13 11:17:58 host sshd[30832]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:18:00 host sshd[30832]: Failed password for invalid user root from 181.30.129.31 port 52364 ssh2 Jan 13 11:18:00 host sshd[30832]: Received disconnect from 181.30.129.31 port 52364:11: Bye Bye [preauth] Jan 13 11:18:00 host sshd[30832]: Disconnected from 181.30.129.31 port 52364 [preauth] Jan 13 11:18:42 host sshd[30915]: User root from 43.131.31.226 not allowed because not listed in AllowUsers Jan 13 11:18:42 host sshd[30915]: input_userauth_request: invalid user root [preauth] Jan 13 11:18:42 host unix_chkpwd[30918]: password check failed for user (root) Jan 13 11:18:42 host sshd[30915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.31.226 user=root Jan 13 11:18:42 host sshd[30915]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:18:44 host sshd[30915]: Failed password for invalid user root from 43.131.31.226 port 48384 ssh2 Jan 13 11:18:45 host sshd[30915]: Received disconnect from 43.131.31.226 port 48384:11: Bye Bye [preauth] Jan 13 11:18:45 host sshd[30915]: Disconnected from 43.131.31.226 port 48384 [preauth] Jan 13 11:18:46 host sshd[30927]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 13 11:18:46 host sshd[30927]: input_userauth_request: invalid user root [preauth] Jan 13 11:18:46 host unix_chkpwd[30932]: password check failed for user (root) Jan 13 11:18:46 host sshd[30927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 13 11:18:46 host sshd[30927]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:18:49 host sshd[30927]: Failed password for invalid user root from 195.226.194.242 port 41868 ssh2 Jan 13 11:18:49 host sshd[30927]: Received disconnect from 195.226.194.242 port 41868:11: Bye Bye [preauth] Jan 13 11:18:49 host sshd[30927]: Disconnected from 195.226.194.242 port 41868 [preauth] Jan 13 11:19:51 host sshd[31087]: User root from 83.209.41.236 not allowed because not listed in AllowUsers Jan 13 11:19:51 host sshd[31087]: input_userauth_request: invalid user root [preauth] Jan 13 11:19:52 host unix_chkpwd[31096]: password check failed for user (root) Jan 13 11:19:52 host sshd[31087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.209.41.236 user=root Jan 13 11:19:52 host sshd[31087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:19:53 host sshd[31087]: Failed password for invalid user root from 83.209.41.236 port 24274 ssh2 Jan 13 11:19:54 host sshd[31087]: Received disconnect from 83.209.41.236 port 24274:11: Bye Bye [preauth] Jan 13 11:19:54 host sshd[31087]: Disconnected from 83.209.41.236 port 24274 [preauth] Jan 13 11:20:05 host sshd[31174]: User root from 43.131.31.226 not allowed because not listed in AllowUsers Jan 13 11:20:05 host sshd[31174]: input_userauth_request: invalid user root [preauth] Jan 13 11:20:05 host unix_chkpwd[31179]: password check failed for user (root) Jan 13 11:20:05 host sshd[31174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.31.226 user=root Jan 13 11:20:05 host sshd[31174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:20:08 host sshd[31174]: Failed password for invalid user root from 43.131.31.226 port 48334 ssh2 Jan 13 11:20:08 host sshd[31174]: Received disconnect from 43.131.31.226 port 48334:11: Bye Bye [preauth] Jan 13 11:20:08 host sshd[31174]: Disconnected from 43.131.31.226 port 48334 [preauth] Jan 13 11:20:38 host sshd[31399]: User root from 181.30.129.31 not allowed because not listed in AllowUsers Jan 13 11:20:38 host sshd[31399]: input_userauth_request: invalid user root [preauth] Jan 13 11:20:38 host unix_chkpwd[31403]: password check failed for user (root) Jan 13 11:20:38 host sshd[31399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.129.31 user=root Jan 13 11:20:38 host sshd[31399]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:20:40 host sshd[31399]: Failed password for invalid user root from 181.30.129.31 port 54172 ssh2 Jan 13 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 11:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 11:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=phmetals user-6=kottayamcalldriv user-7=gifterman user-8=palco123 user-9=wwwnexidigital user-10=mrsclean user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=wwwtestugo user-17=shalinijames user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwrmswll user-24=keralaholi user-25=wwwresourcehunte user-26=cochintaxi user-27=wwwkaretakers user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 11:22:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 11:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 11:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cCyE57MZWusIXtjf.~ Jan 13 11:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cCyE57MZWusIXtjf.~' Jan 13 11:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cCyE57MZWusIXtjf.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 11:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 11:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 11:22:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 11:22:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 11:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 11:22:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 11:22:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 11:22:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 11:22:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:22:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 11:22:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 11:22:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 11:29:13 host sshd[682]: Invalid user admin from 106.105.115.156 port 45199 Jan 13 11:29:13 host sshd[682]: input_userauth_request: invalid user admin [preauth] Jan 13 11:29:13 host sshd[682]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:29:13 host sshd[682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.105.115.156 Jan 13 11:29:16 host sshd[682]: Failed password for invalid user admin from 106.105.115.156 port 45199 ssh2 Jan 13 11:29:16 host sshd[682]: Failed password for invalid user admin from 106.105.115.156 port 45199 ssh2 Jan 13 11:29:17 host sshd[682]: Connection reset by 106.105.115.156 port 45199 [preauth] Jan 13 11:31:03 host sshd[949]: Connection closed by 89.100.208.17 port 48276 [preauth] Jan 13 11:31:04 host sshd[979]: User root from 68.183.187.216 not allowed because not listed in AllowUsers Jan 13 11:31:04 host sshd[979]: input_userauth_request: invalid user root [preauth] Jan 13 11:31:04 host unix_chkpwd[982]: password check failed for user (root) Jan 13 11:31:04 host sshd[979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.187.216 user=root Jan 13 11:31:04 host sshd[979]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:31:07 host sshd[979]: Failed password for invalid user root from 68.183.187.216 port 59674 ssh2 Jan 13 11:31:07 host sshd[979]: Received disconnect from 68.183.187.216 port 59674:11: Bye Bye [preauth] Jan 13 11:31:07 host sshd[979]: Disconnected from 68.183.187.216 port 59674 [preauth] Jan 13 11:31:10 host sshd[991]: User root from 206.189.42.174 not allowed because not listed in AllowUsers Jan 13 11:31:10 host sshd[991]: input_userauth_request: invalid user root [preauth] Jan 13 11:31:10 host unix_chkpwd[994]: password check failed for user (root) Jan 13 11:31:10 host sshd[991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.42.174 user=root Jan 13 11:31:10 host sshd[991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:31:12 host sshd[991]: Failed password for invalid user root from 206.189.42.174 port 40894 ssh2 Jan 13 11:31:12 host sshd[991]: Received disconnect from 206.189.42.174 port 40894:11: Bye Bye [preauth] Jan 13 11:31:12 host sshd[991]: Disconnected from 206.189.42.174 port 40894 [preauth] Jan 13 11:31:18 host sshd[1006]: User root from 174.138.28.154 not allowed because not listed in AllowUsers Jan 13 11:31:18 host sshd[1006]: input_userauth_request: invalid user root [preauth] Jan 13 11:31:18 host unix_chkpwd[1008]: password check failed for user (root) Jan 13 11:31:18 host sshd[1006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.28.154 user=root Jan 13 11:31:18 host sshd[1006]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:31:20 host sshd[1006]: Failed password for invalid user root from 174.138.28.154 port 43252 ssh2 Jan 13 11:31:20 host sshd[1006]: Received disconnect from 174.138.28.154 port 43252:11: Bye Bye [preauth] Jan 13 11:31:20 host sshd[1006]: Disconnected from 174.138.28.154 port 43252 [preauth] Jan 13 11:31:21 host sshd[1013]: User root from 81.192.46.38 not allowed because not listed in AllowUsers Jan 13 11:31:21 host sshd[1013]: input_userauth_request: invalid user root [preauth] Jan 13 11:31:21 host unix_chkpwd[1016]: password check failed for user (root) Jan 13 11:31:21 host sshd[1013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.192.46.38 user=root Jan 13 11:31:21 host sshd[1013]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:31:22 host sshd[1013]: Failed password for invalid user root from 81.192.46.38 port 51258 ssh2 Jan 13 11:31:23 host sshd[1013]: Received disconnect from 81.192.46.38 port 51258:11: Bye Bye [preauth] Jan 13 11:31:23 host sshd[1013]: Disconnected from 81.192.46.38 port 51258 [preauth] Jan 13 11:31:33 host sshd[1057]: User root from 146.190.58.126 not allowed because not listed in AllowUsers Jan 13 11:31:33 host sshd[1057]: input_userauth_request: invalid user root [preauth] Jan 13 11:31:33 host unix_chkpwd[1061]: password check failed for user (root) Jan 13 11:31:33 host sshd[1057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.58.126 user=root Jan 13 11:31:33 host sshd[1057]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:31:35 host sshd[1057]: Failed password for invalid user root from 146.190.58.126 port 50844 ssh2 Jan 13 11:31:35 host sshd[1057]: Received disconnect from 146.190.58.126 port 50844:11: Bye Bye [preauth] Jan 13 11:31:35 host sshd[1057]: Disconnected from 146.190.58.126 port 50844 [preauth] Jan 13 11:32:42 host sshd[1216]: User root from 211.75.19.210 not allowed because not listed in AllowUsers Jan 13 11:32:42 host sshd[1216]: input_userauth_request: invalid user root [preauth] Jan 13 11:32:42 host unix_chkpwd[1220]: password check failed for user (root) Jan 13 11:32:42 host sshd[1216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.19.210 user=root Jan 13 11:32:42 host sshd[1216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:32:45 host sshd[1216]: Failed password for invalid user root from 211.75.19.210 port 44770 ssh2 Jan 13 11:32:45 host sshd[1216]: Received disconnect from 211.75.19.210 port 44770:11: Bye Bye [preauth] Jan 13 11:32:45 host sshd[1216]: Disconnected from 211.75.19.210 port 44770 [preauth] Jan 13 11:33:19 host sshd[1411]: User root from 192.241.156.50 not allowed because not listed in AllowUsers Jan 13 11:33:19 host sshd[1411]: input_userauth_request: invalid user root [preauth] Jan 13 11:33:19 host unix_chkpwd[1415]: password check failed for user (root) Jan 13 11:33:19 host sshd[1411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.156.50 user=root Jan 13 11:33:19 host sshd[1411]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:33:21 host sshd[1411]: Failed password for invalid user root from 192.241.156.50 port 58454 ssh2 Jan 13 11:33:21 host sshd[1411]: Received disconnect from 192.241.156.50 port 58454:11: Bye Bye [preauth] Jan 13 11:33:21 host sshd[1411]: Disconnected from 192.241.156.50 port 58454 [preauth] Jan 13 11:34:04 host sshd[1539]: User root from 151.93.146.217 not allowed because not listed in AllowUsers Jan 13 11:34:04 host sshd[1539]: input_userauth_request: invalid user root [preauth] Jan 13 11:34:04 host unix_chkpwd[1543]: password check failed for user (root) Jan 13 11:34:04 host sshd[1539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.93.146.217 user=root Jan 13 11:34:04 host sshd[1539]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:34:05 host sshd[1539]: Failed password for invalid user root from 151.93.146.217 port 43150 ssh2 Jan 13 11:34:05 host sshd[1539]: Received disconnect from 151.93.146.217 port 43150:11: Bye Bye [preauth] Jan 13 11:34:05 host sshd[1539]: Disconnected from 151.93.146.217 port 43150 [preauth] Jan 13 11:34:14 host sshd[1550]: Connection closed by 89.100.208.17 port 42786 [preauth] Jan 13 11:34:19 host sshd[1577]: User root from 118.70.170.120 not allowed because not listed in AllowUsers Jan 13 11:34:19 host sshd[1577]: input_userauth_request: invalid user root [preauth] Jan 13 11:34:19 host unix_chkpwd[1582]: password check failed for user (root) Jan 13 11:34:19 host sshd[1577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.170.120 user=root Jan 13 11:34:19 host sshd[1577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:34:21 host sshd[1577]: Failed password for invalid user root from 118.70.170.120 port 60222 ssh2 Jan 13 11:34:22 host sshd[1577]: Received disconnect from 118.70.170.120 port 60222:11: Bye Bye [preauth] Jan 13 11:34:22 host sshd[1577]: Disconnected from 118.70.170.120 port 60222 [preauth] Jan 13 11:34:51 host sshd[1675]: User root from 143.255.141.251 not allowed because not listed in AllowUsers Jan 13 11:34:51 host sshd[1675]: input_userauth_request: invalid user root [preauth] Jan 13 11:34:51 host unix_chkpwd[1682]: password check failed for user (root) Jan 13 11:34:51 host sshd[1675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.141.251 user=root Jan 13 11:34:51 host sshd[1675]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:34:53 host sshd[1675]: Failed password for invalid user root from 143.255.141.251 port 49966 ssh2 Jan 13 11:34:54 host sshd[1675]: Received disconnect from 143.255.141.251 port 49966:11: Bye Bye [preauth] Jan 13 11:34:54 host sshd[1675]: Disconnected from 143.255.141.251 port 49966 [preauth] Jan 13 11:34:59 host sshd[1696]: User root from 128.199.141.33 not allowed because not listed in AllowUsers Jan 13 11:34:59 host sshd[1696]: input_userauth_request: invalid user root [preauth] Jan 13 11:34:59 host unix_chkpwd[1698]: password check failed for user (root) Jan 13 11:34:59 host sshd[1696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.141.33 user=root Jan 13 11:34:59 host sshd[1696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:35:01 host sshd[1696]: Failed password for invalid user root from 128.199.141.33 port 46572 ssh2 Jan 13 11:35:01 host sshd[1696]: Received disconnect from 128.199.141.33 port 46572:11: Bye Bye [preauth] Jan 13 11:35:01 host sshd[1696]: Disconnected from 128.199.141.33 port 46572 [preauth] Jan 13 11:35:11 host sshd[1761]: User root from 34.96.172.192 not allowed because not listed in AllowUsers Jan 13 11:35:11 host sshd[1761]: input_userauth_request: invalid user root [preauth] Jan 13 11:35:11 host unix_chkpwd[1763]: password check failed for user (root) Jan 13 11:35:11 host sshd[1761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.96.172.192 user=root Jan 13 11:35:11 host sshd[1761]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:35:13 host sshd[1761]: Failed password for invalid user root from 34.96.172.192 port 42808 ssh2 Jan 13 11:35:13 host sshd[1761]: Received disconnect from 34.96.172.192 port 42808:11: Bye Bye [preauth] Jan 13 11:35:13 host sshd[1761]: Disconnected from 34.96.172.192 port 42808 [preauth] Jan 13 11:35:41 host sshd[1847]: User root from 107.173.21.248 not allowed because not listed in AllowUsers Jan 13 11:35:41 host sshd[1847]: input_userauth_request: invalid user root [preauth] Jan 13 11:35:41 host unix_chkpwd[1850]: password check failed for user (root) Jan 13 11:35:41 host sshd[1847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.21.248 user=root Jan 13 11:35:41 host sshd[1847]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:35:43 host sshd[1847]: Failed password for invalid user root from 107.173.21.248 port 39770 ssh2 Jan 13 11:35:44 host sshd[1847]: Received disconnect from 107.173.21.248 port 39770:11: Bye Bye [preauth] Jan 13 11:35:44 host sshd[1847]: Disconnected from 107.173.21.248 port 39770 [preauth] Jan 13 11:35:54 host sshd[1882]: User root from 218.161.68.195 not allowed because not listed in AllowUsers Jan 13 11:35:54 host sshd[1882]: input_userauth_request: invalid user root [preauth] Jan 13 11:35:54 host unix_chkpwd[1886]: password check failed for user (root) Jan 13 11:35:54 host sshd[1882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.161.68.195 user=root Jan 13 11:35:54 host sshd[1882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:35:56 host sshd[1882]: Failed password for invalid user root from 218.161.68.195 port 55481 ssh2 Jan 13 11:35:56 host unix_chkpwd[1889]: password check failed for user (root) Jan 13 11:35:56 host sshd[1882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:35:58 host sshd[1894]: User root from 174.138.28.154 not allowed because not listed in AllowUsers Jan 13 11:35:58 host sshd[1894]: input_userauth_request: invalid user root [preauth] Jan 13 11:35:58 host unix_chkpwd[1897]: password check failed for user (root) Jan 13 11:35:58 host sshd[1894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.28.154 user=root Jan 13 11:35:58 host sshd[1894]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:35:58 host sshd[1882]: Failed password for invalid user root from 218.161.68.195 port 55481 ssh2 Jan 13 11:35:59 host unix_chkpwd[1902]: password check failed for user (root) Jan 13 11:35:59 host sshd[1882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:35:59 host sshd[1900]: User root from 68.183.187.216 not allowed because not listed in AllowUsers Jan 13 11:35:59 host sshd[1900]: input_userauth_request: invalid user root [preauth] Jan 13 11:35:59 host unix_chkpwd[1903]: password check failed for user (root) Jan 13 11:35:59 host sshd[1900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.187.216 user=root Jan 13 11:35:59 host sshd[1900]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:36:00 host sshd[1894]: Failed password for invalid user root from 174.138.28.154 port 32962 ssh2 Jan 13 11:36:00 host sshd[1894]: Received disconnect from 174.138.28.154 port 32962:11: Bye Bye [preauth] Jan 13 11:36:00 host sshd[1894]: Disconnected from 174.138.28.154 port 32962 [preauth] Jan 13 11:36:00 host sshd[1882]: Failed password for invalid user root from 218.161.68.195 port 55481 ssh2 Jan 13 11:36:01 host sshd[1900]: Failed password for invalid user root from 68.183.187.216 port 42128 ssh2 Jan 13 11:36:01 host unix_chkpwd[1967]: password check failed for user (root) Jan 13 11:36:01 host sshd[1882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:36:03 host sshd[1882]: Failed password for invalid user root from 218.161.68.195 port 55481 ssh2 Jan 13 11:36:04 host sshd[1882]: Connection reset by 218.161.68.195 port 55481 [preauth] Jan 13 11:36:04 host sshd[1882]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.161.68.195 user=root Jan 13 11:36:04 host sshd[1882]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 13 11:36:08 host sshd[2019]: User root from 151.93.146.217 not allowed because not listed in AllowUsers Jan 13 11:36:08 host sshd[2019]: input_userauth_request: invalid user root [preauth] Jan 13 11:36:08 host unix_chkpwd[2027]: password check failed for user (root) Jan 13 11:36:08 host sshd[2019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.93.146.217 user=root Jan 13 11:36:08 host sshd[2019]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:36:08 host sshd[2025]: User root from 206.189.42.174 not allowed because not listed in AllowUsers Jan 13 11:36:08 host sshd[2025]: input_userauth_request: invalid user root [preauth] Jan 13 11:36:08 host unix_chkpwd[2028]: password check failed for user (root) Jan 13 11:36:08 host sshd[2025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.42.174 user=root Jan 13 11:36:08 host sshd[2025]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:36:09 host sshd[2019]: Failed password for invalid user root from 151.93.146.217 port 48346 ssh2 Jan 13 11:36:10 host sshd[2025]: Failed password for invalid user root from 206.189.42.174 port 47278 ssh2 Jan 13 11:36:10 host sshd[2019]: Received disconnect from 151.93.146.217 port 48346:11: Bye Bye [preauth] Jan 13 11:36:10 host sshd[2019]: Disconnected from 151.93.146.217 port 48346 [preauth] Jan 13 11:36:10 host sshd[2025]: Received disconnect from 206.189.42.174 port 47278:11: Bye Bye [preauth] Jan 13 11:36:10 host sshd[2025]: Disconnected from 206.189.42.174 port 47278 [preauth] Jan 13 11:36:22 host sshd[2116]: User root from 81.192.46.38 not allowed because not listed in AllowUsers Jan 13 11:36:22 host sshd[2116]: input_userauth_request: invalid user root [preauth] Jan 13 11:36:22 host unix_chkpwd[2119]: password check failed for user (root) Jan 13 11:36:22 host sshd[2116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.192.46.38 user=root Jan 13 11:36:22 host sshd[2116]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:36:23 host sshd[2116]: Failed password for invalid user root from 81.192.46.38 port 43676 ssh2 Jan 13 11:36:24 host sshd[2116]: Received disconnect from 81.192.46.38 port 43676:11: Bye Bye [preauth] Jan 13 11:36:24 host sshd[2116]: Disconnected from 81.192.46.38 port 43676 [preauth] Jan 13 11:36:37 host sshd[2191]: User root from 146.190.58.126 not allowed because not listed in AllowUsers Jan 13 11:36:37 host sshd[2191]: input_userauth_request: invalid user root [preauth] Jan 13 11:36:37 host unix_chkpwd[2197]: password check failed for user (root) Jan 13 11:36:37 host sshd[2191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.58.126 user=root Jan 13 11:36:37 host sshd[2191]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:36:39 host sshd[2191]: Failed password for invalid user root from 146.190.58.126 port 33804 ssh2 Jan 13 11:36:39 host sshd[2191]: Received disconnect from 146.190.58.126 port 33804:11: Bye Bye [preauth] Jan 13 11:36:39 host sshd[2191]: Disconnected from 146.190.58.126 port 33804 [preauth] Jan 13 11:36:41 host sshd[2237]: User root from 118.70.170.120 not allowed because not listed in AllowUsers Jan 13 11:36:41 host sshd[2237]: input_userauth_request: invalid user root [preauth] Jan 13 11:36:42 host unix_chkpwd[2241]: password check failed for user (root) Jan 13 11:36:42 host sshd[2237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.170.120 user=root Jan 13 11:36:42 host sshd[2237]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:36:43 host sshd[2237]: Failed password for invalid user root from 118.70.170.120 port 38088 ssh2 Jan 13 11:36:43 host sshd[2237]: Received disconnect from 118.70.170.120 port 38088:11: Bye Bye [preauth] Jan 13 11:36:43 host sshd[2237]: Disconnected from 118.70.170.120 port 38088 [preauth] Jan 13 11:36:56 host sshd[2292]: User root from 192.241.156.50 not allowed because not listed in AllowUsers Jan 13 11:36:56 host sshd[2292]: input_userauth_request: invalid user root [preauth] Jan 13 11:36:56 host unix_chkpwd[2298]: password check failed for user (root) Jan 13 11:36:56 host sshd[2292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.156.50 user=root Jan 13 11:36:56 host sshd[2292]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:36:58 host sshd[2292]: Failed password for invalid user root from 192.241.156.50 port 41144 ssh2 Jan 13 11:36:58 host sshd[2292]: Received disconnect from 192.241.156.50 port 41144:11: Bye Bye [preauth] Jan 13 11:36:58 host sshd[2292]: Disconnected from 192.241.156.50 port 41144 [preauth] Jan 13 11:37:06 host sshd[2350]: User root from 211.75.19.210 not allowed because not listed in AllowUsers Jan 13 11:37:06 host sshd[2350]: input_userauth_request: invalid user root [preauth] Jan 13 11:37:06 host sshd[2348]: User root from 107.173.21.248 not allowed because not listed in AllowUsers Jan 13 11:37:06 host sshd[2348]: input_userauth_request: invalid user root [preauth] Jan 13 11:37:06 host unix_chkpwd[2353]: password check failed for user (root) Jan 13 11:37:06 host sshd[2350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.19.210 user=root Jan 13 11:37:06 host sshd[2350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:37:06 host unix_chkpwd[2354]: password check failed for user (root) Jan 13 11:37:06 host sshd[2348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.21.248 user=root Jan 13 11:37:06 host sshd[2348]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:37:08 host sshd[2350]: Failed password for invalid user root from 211.75.19.210 port 59970 ssh2 Jan 13 11:37:08 host sshd[2348]: Failed password for invalid user root from 107.173.21.248 port 40134 ssh2 Jan 13 11:37:08 host sshd[2350]: Received disconnect from 211.75.19.210 port 59970:11: Bye Bye [preauth] Jan 13 11:37:08 host sshd[2350]: Disconnected from 211.75.19.210 port 59970 [preauth] Jan 13 11:37:08 host sshd[2348]: Received disconnect from 107.173.21.248 port 40134:11: Bye Bye [preauth] Jan 13 11:37:08 host sshd[2348]: Disconnected from 107.173.21.248 port 40134 [preauth] Jan 13 11:37:15 host sshd[2444]: User root from 143.255.141.251 not allowed because not listed in AllowUsers Jan 13 11:37:15 host sshd[2444]: input_userauth_request: invalid user root [preauth] Jan 13 11:37:15 host unix_chkpwd[2449]: password check failed for user (root) Jan 13 11:37:15 host sshd[2444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.141.251 user=root Jan 13 11:37:15 host sshd[2444]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:37:17 host sshd[2444]: Failed password for invalid user root from 143.255.141.251 port 56772 ssh2 Jan 13 11:37:17 host sshd[2444]: Received disconnect from 143.255.141.251 port 56772:11: Bye Bye [preauth] Jan 13 11:37:17 host sshd[2444]: Disconnected from 143.255.141.251 port 56772 [preauth] Jan 13 11:37:27 host sshd[2508]: Connection closed by 89.100.208.17 port 37250 [preauth] Jan 13 11:37:30 host sshd[2541]: User root from 128.199.141.33 not allowed because not listed in AllowUsers Jan 13 11:37:30 host sshd[2541]: input_userauth_request: invalid user root [preauth] Jan 13 11:37:30 host unix_chkpwd[2544]: password check failed for user (root) Jan 13 11:37:30 host sshd[2541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.141.33 user=root Jan 13 11:37:30 host sshd[2541]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:37:32 host sshd[2541]: Failed password for invalid user root from 128.199.141.33 port 52368 ssh2 Jan 13 11:37:38 host sshd[2605]: User root from 34.96.172.192 not allowed because not listed in AllowUsers Jan 13 11:37:38 host sshd[2605]: input_userauth_request: invalid user root [preauth] Jan 13 11:37:38 host unix_chkpwd[2608]: password check failed for user (root) Jan 13 11:37:38 host sshd[2605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.96.172.192 user=root Jan 13 11:37:38 host sshd[2605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:37:41 host sshd[2605]: Failed password for invalid user root from 34.96.172.192 port 9458 ssh2 Jan 13 11:40:39 host sshd[3175]: Connection closed by 89.100.208.17 port 59952 [preauth] Jan 13 11:43:49 host sshd[3611]: Connection closed by 89.100.208.17 port 54416 [preauth] Jan 13 11:45:19 host sshd[3899]: Connection reset by 125.229.19.177 port 52410 [preauth] Jan 13 11:46:11 host sshd[4012]: Connection closed by 89.100.208.17 port 42836 [preauth] Jan 13 11:48:52 host sshd[4368]: Invalid user user from 195.226.194.242 port 62216 Jan 13 11:48:52 host sshd[4368]: input_userauth_request: invalid user user [preauth] Jan 13 11:48:53 host sshd[4368]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:48:53 host sshd[4368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 13 11:48:55 host sshd[4368]: Failed password for invalid user user from 195.226.194.242 port 62216 ssh2 Jan 13 11:48:55 host sshd[4368]: Received disconnect from 195.226.194.242 port 62216:11: Bye Bye [preauth] Jan 13 11:48:55 host sshd[4368]: Disconnected from 195.226.194.242 port 62216 [preauth] Jan 13 11:49:18 host sshd[4433]: Connection closed by 89.100.208.17 port 37304 [preauth] Jan 13 11:52:32 host sshd[4914]: User root from 89.100.208.17 not allowed because not listed in AllowUsers Jan 13 11:52:32 host sshd[4914]: input_userauth_request: invalid user root [preauth] Jan 13 11:52:32 host unix_chkpwd[4961]: password check failed for user (root) Jan 13 11:52:32 host sshd[4914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.208.17 user=root Jan 13 11:52:32 host sshd[4914]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:52:34 host sshd[4914]: Failed password for invalid user root from 89.100.208.17 port 60000 ssh2 Jan 13 11:52:36 host sshd[4914]: Received disconnect from 89.100.208.17 port 60000:11: Bye Bye [preauth] Jan 13 11:52:36 host sshd[4914]: Disconnected from 89.100.208.17 port 60000 [preauth] Jan 13 11:57:26 host sshd[5681]: Invalid user admin from 221.158.213.53 port 43158 Jan 13 11:57:26 host sshd[5681]: input_userauth_request: invalid user admin [preauth] Jan 13 11:57:26 host sshd[5681]: pam_unix(sshd:auth): check pass; user unknown Jan 13 11:57:26 host sshd[5681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.158.213.53 Jan 13 11:57:28 host sshd[5681]: Failed password for invalid user admin from 221.158.213.53 port 43158 ssh2 Jan 13 11:57:29 host sshd[5681]: Connection closed by 221.158.213.53 port 43158 [preauth] Jan 13 11:58:08 host sshd[5767]: User root from 119.196.240.80 not allowed because not listed in AllowUsers Jan 13 11:58:08 host sshd[5767]: input_userauth_request: invalid user root [preauth] Jan 13 11:58:09 host unix_chkpwd[5771]: password check failed for user (root) Jan 13 11:58:09 host sshd[5767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.240.80 user=root Jan 13 11:58:09 host sshd[5767]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:58:11 host sshd[5767]: Failed password for invalid user root from 119.196.240.80 port 63107 ssh2 Jan 13 11:59:54 host sshd[5977]: User root from 181.49.50.202 not allowed because not listed in AllowUsers Jan 13 11:59:54 host sshd[5977]: input_userauth_request: invalid user root [preauth] Jan 13 11:59:55 host unix_chkpwd[5981]: password check failed for user (root) Jan 13 11:59:55 host sshd[5977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.50.202 user=root Jan 13 11:59:55 host sshd[5977]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 11:59:57 host sshd[5977]: Failed password for invalid user root from 181.49.50.202 port 41076 ssh2 Jan 13 11:59:57 host sshd[5977]: Received disconnect from 181.49.50.202 port 41076:11: Bye Bye [preauth] Jan 13 11:59:57 host sshd[5977]: Disconnected from 181.49.50.202 port 41076 [preauth] Jan 13 12:00:01 host sshd[5985]: User root from 201.6.107.69 not allowed because not listed in AllowUsers Jan 13 12:00:01 host sshd[5985]: input_userauth_request: invalid user root [preauth] Jan 13 12:00:01 host unix_chkpwd[6026]: password check failed for user (root) Jan 13 12:00:01 host sshd[5985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.107.69 user=root Jan 13 12:00:01 host sshd[5985]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:00:03 host sshd[5985]: Failed password for invalid user root from 201.6.107.69 port 39456 ssh2 Jan 13 12:00:03 host sshd[5985]: Received disconnect from 201.6.107.69 port 39456:11: Bye Bye [preauth] Jan 13 12:00:03 host sshd[5985]: Disconnected from 201.6.107.69 port 39456 [preauth] Jan 13 12:00:18 host sshd[6050]: User root from 89.185.85.119 not allowed because not listed in AllowUsers Jan 13 12:00:18 host sshd[6050]: input_userauth_request: invalid user root [preauth] Jan 13 12:00:18 host unix_chkpwd[6053]: password check failed for user (root) Jan 13 12:00:18 host sshd[6050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.185.85.119 user=root Jan 13 12:00:18 host sshd[6050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:00:20 host sshd[6050]: Failed password for invalid user root from 89.185.85.119 port 41688 ssh2 Jan 13 12:00:20 host sshd[6050]: Received disconnect from 89.185.85.119 port 41688:11: Bye Bye [preauth] Jan 13 12:00:20 host sshd[6050]: Disconnected from 89.185.85.119 port 41688 [preauth] Jan 13 12:01:01 host sshd[6132]: User root from 45.148.120.252 not allowed because not listed in AllowUsers Jan 13 12:01:01 host sshd[6132]: input_userauth_request: invalid user root [preauth] Jan 13 12:01:01 host unix_chkpwd[6136]: password check failed for user (root) Jan 13 12:01:01 host sshd[6132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.120.252 user=root Jan 13 12:01:01 host sshd[6132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:01:02 host sshd[6132]: Failed password for invalid user root from 45.148.120.252 port 39822 ssh2 Jan 13 12:01:02 host sshd[6132]: Received disconnect from 45.148.120.252 port 39822:11: Bye Bye [preauth] Jan 13 12:01:02 host sshd[6132]: Disconnected from 45.148.120.252 port 39822 [preauth] Jan 13 12:01:05 host sshd[6230]: User root from 185.236.9.96 not allowed because not listed in AllowUsers Jan 13 12:01:05 host sshd[6230]: input_userauth_request: invalid user root [preauth] Jan 13 12:01:05 host unix_chkpwd[6260]: password check failed for user (root) Jan 13 12:01:05 host sshd[6230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.236.9.96 user=root Jan 13 12:01:05 host sshd[6230]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:01:07 host sshd[6230]: Failed password for invalid user root from 185.236.9.96 port 59060 ssh2 Jan 13 12:01:07 host sshd[6230]: Received disconnect from 185.236.9.96 port 59060:11: Bye Bye [preauth] Jan 13 12:01:07 host sshd[6230]: Disconnected from 185.236.9.96 port 59060 [preauth] Jan 13 12:01:09 host sshd[6284]: User root from 209.97.173.49 not allowed because not listed in AllowUsers Jan 13 12:01:09 host sshd[6284]: input_userauth_request: invalid user root [preauth] Jan 13 12:01:09 host unix_chkpwd[6286]: password check failed for user (root) Jan 13 12:01:09 host sshd[6284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.173.49 user=root Jan 13 12:01:09 host sshd[6284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:01:11 host sshd[6284]: Failed password for invalid user root from 209.97.173.49 port 39376 ssh2 Jan 13 12:01:11 host sshd[6284]: Received disconnect from 209.97.173.49 port 39376:11: Bye Bye [preauth] Jan 13 12:01:11 host sshd[6284]: Disconnected from 209.97.173.49 port 39376 [preauth] Jan 13 12:01:33 host sshd[6343]: User root from 143.198.161.95 not allowed because not listed in AllowUsers Jan 13 12:01:33 host sshd[6343]: input_userauth_request: invalid user root [preauth] Jan 13 12:01:34 host unix_chkpwd[6346]: password check failed for user (root) Jan 13 12:01:34 host sshd[6343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.161.95 user=root Jan 13 12:01:34 host sshd[6343]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:01:35 host sshd[6343]: Failed password for invalid user root from 143.198.161.95 port 54434 ssh2 Jan 13 12:01:35 host sshd[6343]: Received disconnect from 143.198.161.95 port 54434:11: Bye Bye [preauth] Jan 13 12:01:35 host sshd[6343]: Disconnected from 143.198.161.95 port 54434 [preauth] Jan 13 12:02:30 host sshd[6454]: User root from 145.239.90.141 not allowed because not listed in AllowUsers Jan 13 12:02:30 host sshd[6454]: input_userauth_request: invalid user root [preauth] Jan 13 12:02:30 host unix_chkpwd[6459]: password check failed for user (root) Jan 13 12:02:30 host sshd[6454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.90.141 user=root Jan 13 12:02:30 host sshd[6454]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:02:33 host sshd[6454]: Failed password for invalid user root from 145.239.90.141 port 34994 ssh2 Jan 13 12:02:33 host sshd[6454]: Received disconnect from 145.239.90.141 port 34994:11: Bye Bye [preauth] Jan 13 12:02:33 host sshd[6454]: Disconnected from 145.239.90.141 port 34994 [preauth] Jan 13 12:02:41 host sshd[6481]: User root from 92.50.249.166 not allowed because not listed in AllowUsers Jan 13 12:02:41 host sshd[6481]: input_userauth_request: invalid user root [preauth] Jan 13 12:02:41 host unix_chkpwd[6487]: password check failed for user (root) Jan 13 12:02:41 host sshd[6481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.166 user=root Jan 13 12:02:41 host sshd[6481]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:02:43 host sshd[6481]: Failed password for invalid user root from 92.50.249.166 port 48382 ssh2 Jan 13 12:02:43 host sshd[6481]: Received disconnect from 92.50.249.166 port 48382:11: Bye Bye [preauth] Jan 13 12:02:43 host sshd[6481]: Disconnected from 92.50.249.166 port 48382 [preauth] Jan 13 12:02:47 host sshd[6477]: Connection closed by 192.241.209.125 port 56868 [preauth] Jan 13 12:05:08 host sshd[6788]: User root from 45.7.228.62 not allowed because not listed in AllowUsers Jan 13 12:05:08 host sshd[6788]: input_userauth_request: invalid user root [preauth] Jan 13 12:05:08 host unix_chkpwd[6792]: password check failed for user (root) Jan 13 12:05:08 host sshd[6788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.228.62 user=root Jan 13 12:05:08 host sshd[6788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:05:11 host sshd[6788]: Failed password for invalid user root from 45.7.228.62 port 49094 ssh2 Jan 13 12:05:11 host sshd[6788]: Received disconnect from 45.7.228.62 port 49094:11: Bye Bye [preauth] Jan 13 12:05:11 host sshd[6788]: Disconnected from 45.7.228.62 port 49094 [preauth] Jan 13 12:05:18 host sshd[6802]: User root from 89.185.85.119 not allowed because not listed in AllowUsers Jan 13 12:05:18 host sshd[6802]: input_userauth_request: invalid user root [preauth] Jan 13 12:05:18 host unix_chkpwd[6805]: password check failed for user (root) Jan 13 12:05:18 host sshd[6802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.185.85.119 user=root Jan 13 12:05:18 host sshd[6802]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:05:21 host sshd[6802]: Failed password for invalid user root from 89.185.85.119 port 41920 ssh2 Jan 13 12:05:21 host sshd[6802]: Received disconnect from 89.185.85.119 port 41920:11: Bye Bye [preauth] Jan 13 12:05:21 host sshd[6802]: Disconnected from 89.185.85.119 port 41920 [preauth] Jan 13 12:05:48 host sshd[6973]: User root from 45.148.120.252 not allowed because not listed in AllowUsers Jan 13 12:05:48 host sshd[6973]: input_userauth_request: invalid user root [preauth] Jan 13 12:05:48 host unix_chkpwd[6975]: password check failed for user (root) Jan 13 12:05:48 host sshd[6973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.120.252 user=root Jan 13 12:05:48 host sshd[6973]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:05:50 host sshd[6973]: Failed password for invalid user root from 45.148.120.252 port 58990 ssh2 Jan 13 12:05:50 host sshd[6973]: Received disconnect from 45.148.120.252 port 58990:11: Bye Bye [preauth] Jan 13 12:05:50 host sshd[6973]: Disconnected from 45.148.120.252 port 58990 [preauth] Jan 13 12:05:56 host sshd[7058]: User root from 181.49.50.202 not allowed because not listed in AllowUsers Jan 13 12:05:56 host sshd[7058]: input_userauth_request: invalid user root [preauth] Jan 13 12:05:56 host unix_chkpwd[7062]: password check failed for user (root) Jan 13 12:05:56 host sshd[7058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.50.202 user=root Jan 13 12:05:56 host sshd[7058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:05:58 host sshd[7058]: Failed password for invalid user root from 181.49.50.202 port 38604 ssh2 Jan 13 12:06:01 host sshd[7097]: User root from 45.70.188.227 not allowed because not listed in AllowUsers Jan 13 12:06:01 host sshd[7097]: input_userauth_request: invalid user root [preauth] Jan 13 12:06:01 host unix_chkpwd[7102]: password check failed for user (root) Jan 13 12:06:01 host sshd[7097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.188.227 user=root Jan 13 12:06:01 host sshd[7097]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:06:01 host sshd[7100]: User root from 92.50.249.166 not allowed because not listed in AllowUsers Jan 13 12:06:01 host sshd[7100]: input_userauth_request: invalid user root [preauth] Jan 13 12:06:01 host unix_chkpwd[7115]: password check failed for user (root) Jan 13 12:06:01 host sshd[7100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.166 user=root Jan 13 12:06:01 host sshd[7100]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:06:03 host sshd[7097]: Failed password for invalid user root from 45.70.188.227 port 43458 ssh2 Jan 13 12:06:03 host sshd[7097]: Received disconnect from 45.70.188.227 port 43458:11: Bye Bye [preauth] Jan 13 12:06:03 host sshd[7097]: Disconnected from 45.70.188.227 port 43458 [preauth] Jan 13 12:06:03 host sshd[7117]: User root from 209.97.173.49 not allowed because not listed in AllowUsers Jan 13 12:06:03 host sshd[7117]: input_userauth_request: invalid user root [preauth] Jan 13 12:06:03 host unix_chkpwd[7120]: password check failed for user (root) Jan 13 12:06:03 host sshd[7117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.173.49 user=root Jan 13 12:06:03 host sshd[7117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:06:03 host sshd[7100]: Failed password for invalid user root from 92.50.249.166 port 32942 ssh2 Jan 13 12:06:03 host sshd[7100]: Received disconnect from 92.50.249.166 port 32942:11: Bye Bye [preauth] Jan 13 12:06:03 host sshd[7100]: Disconnected from 92.50.249.166 port 32942 [preauth] Jan 13 12:06:06 host sshd[7117]: Failed password for invalid user root from 209.97.173.49 port 54098 ssh2 Jan 13 12:06:06 host sshd[7117]: Received disconnect from 209.97.173.49 port 54098:11: Bye Bye [preauth] Jan 13 12:06:06 host sshd[7117]: Disconnected from 209.97.173.49 port 54098 [preauth] Jan 13 12:06:39 host sshd[7477]: User root from 143.198.161.95 not allowed because not listed in AllowUsers Jan 13 12:06:39 host sshd[7477]: input_userauth_request: invalid user root [preauth] Jan 13 12:06:39 host unix_chkpwd[7481]: password check failed for user (root) Jan 13 12:06:39 host sshd[7477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.161.95 user=root Jan 13 12:06:39 host sshd[7477]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:06:42 host sshd[7477]: Failed password for invalid user root from 143.198.161.95 port 35236 ssh2 Jan 13 12:06:42 host sshd[7477]: Received disconnect from 143.198.161.95 port 35236:11: Bye Bye [preauth] Jan 13 12:06:42 host sshd[7477]: Disconnected from 143.198.161.95 port 35236 [preauth] Jan 13 12:06:46 host sshd[7529]: User root from 145.239.90.141 not allowed because not listed in AllowUsers Jan 13 12:06:46 host sshd[7529]: input_userauth_request: invalid user root [preauth] Jan 13 12:06:46 host unix_chkpwd[7532]: password check failed for user (root) Jan 13 12:06:46 host sshd[7529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.90.141 user=root Jan 13 12:06:46 host sshd[7529]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:06:47 host sshd[7529]: Failed password for invalid user root from 145.239.90.141 port 35172 ssh2 Jan 13 12:06:48 host sshd[7529]: Received disconnect from 145.239.90.141 port 35172:11: Bye Bye [preauth] Jan 13 12:06:48 host sshd[7529]: Disconnected from 145.239.90.141 port 35172 [preauth] Jan 13 12:07:13 host sshd[7726]: User root from 201.6.107.69 not allowed because not listed in AllowUsers Jan 13 12:07:13 host sshd[7726]: input_userauth_request: invalid user root [preauth] Jan 13 12:07:13 host unix_chkpwd[7744]: password check failed for user (root) Jan 13 12:07:13 host sshd[7726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.107.69 user=root Jan 13 12:07:13 host sshd[7726]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:07:16 host sshd[7726]: Failed password for invalid user root from 201.6.107.69 port 59292 ssh2 Jan 13 12:07:16 host sshd[7726]: Received disconnect from 201.6.107.69 port 59292:11: Bye Bye [preauth] Jan 13 12:07:16 host sshd[7726]: Disconnected from 201.6.107.69 port 59292 [preauth] Jan 13 12:07:17 host sshd[7766]: User root from 185.236.9.96 not allowed because not listed in AllowUsers Jan 13 12:07:17 host sshd[7766]: input_userauth_request: invalid user root [preauth] Jan 13 12:07:17 host unix_chkpwd[7803]: password check failed for user (root) Jan 13 12:07:17 host sshd[7766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.236.9.96 user=root Jan 13 12:07:17 host sshd[7766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:07:18 host sshd[7787]: User root from 45.7.228.62 not allowed because not listed in AllowUsers Jan 13 12:07:18 host sshd[7787]: input_userauth_request: invalid user root [preauth] Jan 13 12:07:18 host unix_chkpwd[7818]: password check failed for user (root) Jan 13 12:07:18 host sshd[7787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.228.62 user=root Jan 13 12:07:18 host sshd[7787]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:07:19 host sshd[7766]: Failed password for invalid user root from 185.236.9.96 port 58918 ssh2 Jan 13 12:07:19 host sshd[7766]: Received disconnect from 185.236.9.96 port 58918:11: Bye Bye [preauth] Jan 13 12:07:19 host sshd[7766]: Disconnected from 185.236.9.96 port 58918 [preauth] Jan 13 12:07:20 host sshd[7787]: Failed password for invalid user root from 45.7.228.62 port 55582 ssh2 Jan 13 12:07:20 host sshd[7787]: Received disconnect from 45.7.228.62 port 55582:11: Bye Bye [preauth] Jan 13 12:07:20 host sshd[7787]: Disconnected from 45.7.228.62 port 55582 [preauth] Jan 13 12:07:28 host sshd[7888]: User root from 45.70.188.227 not allowed because not listed in AllowUsers Jan 13 12:07:28 host sshd[7888]: input_userauth_request: invalid user root [preauth] Jan 13 12:07:28 host unix_chkpwd[7892]: password check failed for user (root) Jan 13 12:07:28 host sshd[7888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.188.227 user=root Jan 13 12:07:28 host sshd[7888]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:07:30 host sshd[7888]: Failed password for invalid user root from 45.70.188.227 port 37906 ssh2 Jan 13 12:07:30 host sshd[7888]: Received disconnect from 45.70.188.227 port 37906:11: Bye Bye [preauth] Jan 13 12:07:30 host sshd[7888]: Disconnected from 45.70.188.227 port 37906 [preauth] Jan 13 12:14:00 host sshd[9320]: Invalid user vadmin from 118.34.33.31 port 63402 Jan 13 12:14:00 host sshd[9320]: input_userauth_request: invalid user vadmin [preauth] Jan 13 12:14:00 host sshd[9320]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:14:00 host sshd[9320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.33.31 Jan 13 12:14:02 host sshd[9320]: Failed password for invalid user vadmin from 118.34.33.31 port 63402 ssh2 Jan 13 12:14:03 host sshd[9320]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:14:05 host sshd[9320]: Failed password for invalid user vadmin from 118.34.33.31 port 63402 ssh2 Jan 13 12:14:23 host sshd[9369]: Connection closed by 172.104.11.51 port 32720 [preauth] Jan 13 12:14:24 host sshd[9372]: Connection closed by 172.104.11.51 port 32738 [preauth] Jan 13 12:14:26 host sshd[9375]: Connection closed by 172.104.11.51 port 32760 [preauth] Jan 13 12:18:40 host sshd[10105]: User root from 103.96.75.75 not allowed because not listed in AllowUsers Jan 13 12:18:40 host sshd[10105]: input_userauth_request: invalid user root [preauth] Jan 13 12:18:40 host unix_chkpwd[10108]: password check failed for user (root) Jan 13 12:18:40 host sshd[10105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.96.75.75 user=root Jan 13 12:18:40 host sshd[10105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:18:41 host sshd[10105]: Failed password for invalid user root from 103.96.75.75 port 35574 ssh2 Jan 13 12:18:42 host sshd[10105]: Received disconnect from 103.96.75.75 port 35574:11: Bye Bye [preauth] Jan 13 12:18:42 host sshd[10105]: Disconnected from 103.96.75.75 port 35574 [preauth] Jan 13 12:18:54 host sshd[10125]: Invalid user qinghuamao from 134.122.90.69 port 40778 Jan 13 12:18:54 host sshd[10125]: input_userauth_request: invalid user qinghuamao [preauth] Jan 13 12:18:54 host sshd[10125]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:18:54 host sshd[10125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.90.69 Jan 13 12:18:55 host sshd[10131]: User root from 157.230.185.9 not allowed because not listed in AllowUsers Jan 13 12:18:55 host sshd[10131]: input_userauth_request: invalid user root [preauth] Jan 13 12:18:55 host unix_chkpwd[10134]: password check failed for user (root) Jan 13 12:18:55 host sshd[10131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.185.9 user=root Jan 13 12:18:55 host sshd[10131]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:18:56 host sshd[10125]: Failed password for invalid user qinghuamao from 134.122.90.69 port 40778 ssh2 Jan 13 12:18:56 host sshd[10125]: Received disconnect from 134.122.90.69 port 40778:11: Bye Bye [preauth] Jan 13 12:18:56 host sshd[10125]: Disconnected from 134.122.90.69 port 40778 [preauth] Jan 13 12:18:58 host sshd[10131]: Failed password for invalid user root from 157.230.185.9 port 38084 ssh2 Jan 13 12:18:58 host sshd[10131]: Received disconnect from 157.230.185.9 port 38084:11: Bye Bye [preauth] Jan 13 12:18:58 host sshd[10131]: Disconnected from 157.230.185.9 port 38084 [preauth] Jan 13 12:19:37 host sshd[10234]: User root from 81.183.208.244 not allowed because not listed in AllowUsers Jan 13 12:19:37 host sshd[10234]: input_userauth_request: invalid user root [preauth] Jan 13 12:19:37 host unix_chkpwd[10237]: password check failed for user (root) Jan 13 12:19:37 host sshd[10234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.208.244 user=root Jan 13 12:19:37 host sshd[10234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:19:39 host sshd[10234]: Failed password for invalid user root from 81.183.208.244 port 44098 ssh2 Jan 13 12:19:39 host sshd[10234]: Received disconnect from 81.183.208.244 port 44098:11: Bye Bye [preauth] Jan 13 12:19:39 host sshd[10234]: Disconnected from 81.183.208.244 port 44098 [preauth] Jan 13 12:20:36 host sshd[10435]: Invalid user guest from 51.250.84.137 port 56116 Jan 13 12:20:36 host sshd[10435]: input_userauth_request: invalid user guest [preauth] Jan 13 12:20:36 host sshd[10435]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:20:36 host sshd[10435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.84.137 Jan 13 12:20:38 host sshd[10435]: Failed password for invalid user guest from 51.250.84.137 port 56116 ssh2 Jan 13 12:20:39 host sshd[10435]: Received disconnect from 51.250.84.137 port 56116:11: Bye Bye [preauth] Jan 13 12:20:39 host sshd[10435]: Disconnected from 51.250.84.137 port 56116 [preauth] Jan 13 12:21:13 host sshd[10500]: Invalid user camtest from 217.160.172.183 port 48136 Jan 13 12:21:13 host sshd[10500]: input_userauth_request: invalid user camtest [preauth] Jan 13 12:21:13 host sshd[10500]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:21:13 host sshd[10500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.172.183 Jan 13 12:21:15 host sshd[10500]: Failed password for invalid user camtest from 217.160.172.183 port 48136 ssh2 Jan 13 12:21:13 host sshd[10500]: Invalid user camtest from 217.160.172.183 port 48136 Jan 13 12:21:13 host sshd[10500]: input_userauth_request: invalid user camtest [preauth] Jan 13 12:21:13 host sshd[10500]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:21:13 host sshd[10500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.172.183 Jan 13 12:21:15 host sshd[10500]: Failed password for invalid user camtest from 217.160.172.183 port 48136 ssh2 Jan 13 12:21:15 host sshd[10500]: Received disconnect from 217.160.172.183 port 48136:11: Bye Bye [preauth] Jan 13 12:21:15 host sshd[10500]: Disconnected from 217.160.172.183 port 48136 [preauth] Jan 13 12:21:47 host sshd[10577]: Invalid user guest from 159.65.171.230 port 39560 Jan 13 12:21:47 host sshd[10577]: input_userauth_request: invalid user guest [preauth] Jan 13 12:21:47 host sshd[10577]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:21:47 host sshd[10577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.171.230 Jan 13 12:21:49 host sshd[10577]: Failed password for invalid user guest from 159.65.171.230 port 39560 ssh2 Jan 13 12:21:49 host sshd[10577]: Received disconnect from 159.65.171.230 port 39560:11: Bye Bye [preauth] Jan 13 12:21:49 host sshd[10577]: Disconnected from 159.65.171.230 port 39560 [preauth] Jan 13 12:21:57 host sshd[10592]: Invalid user yan from 167.235.243.187 port 56588 Jan 13 12:21:57 host sshd[10592]: input_userauth_request: invalid user yan [preauth] Jan 13 12:21:57 host sshd[10592]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:21:57 host sshd[10592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.243.187 Jan 13 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:21:59 host sshd[10592]: Failed password for invalid user yan from 167.235.243.187 port 56588 ssh2 Jan 13 12:21:59 host sshd[10592]: Received disconnect from 167.235.243.187 port 56588:11: Bye Bye [preauth] Jan 13 12:21:59 host sshd[10592]: Disconnected from 167.235.243.187 port 56588 [preauth] Jan 13 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=wwwevmhonda user-4=bonifacegroup user-5=mrsclean user-6=wwwnexidigital user-7=phmetals user-8=kottayamcalldriv user-9=palco123 user-10=gifterman user-11=wwwkapin user-12=woodpeck user-13=remysagr user-14=wwwkmaorg user-15=disposeat user-16=pmcresources user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 12:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YPBEosrr7wnl5uJL.~ Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YPBEosrr7wnl5uJL.~' Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-YPBEosrr7wnl5uJL.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 12:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 12:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 12:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 12:23:10 host sshd[11085]: Invalid user drcts from 106.51.76.221 port 15325 Jan 13 12:23:10 host sshd[11085]: input_userauth_request: invalid user drcts [preauth] Jan 13 12:23:10 host sshd[11085]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:23:10 host sshd[11085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.76.221 Jan 13 12:23:12 host sshd[11085]: Failed password for invalid user drcts from 106.51.76.221 port 15325 ssh2 Jan 13 12:23:12 host sshd[11085]: Received disconnect from 106.51.76.221 port 15325:11: Bye Bye [preauth] Jan 13 12:23:12 host sshd[11085]: Disconnected from 106.51.76.221 port 15325 [preauth] Jan 13 12:23:27 host sshd[11123]: Invalid user zhengrc from 190.131.255.12 port 49699 Jan 13 12:23:27 host sshd[11123]: input_userauth_request: invalid user zhengrc [preauth] Jan 13 12:23:27 host sshd[11123]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:23:27 host sshd[11123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.131.255.12 Jan 13 12:23:28 host sshd[11126]: Invalid user camtest from 116.181.16.47 port 47566 Jan 13 12:23:28 host sshd[11126]: input_userauth_request: invalid user camtest [preauth] Jan 13 12:23:28 host sshd[11126]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:23:28 host sshd[11126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.181.16.47 Jan 13 12:23:28 host sshd[11123]: Failed password for invalid user zhengrc from 190.131.255.12 port 49699 ssh2 Jan 13 12:23:29 host sshd[11123]: Received disconnect from 190.131.255.12 port 49699:11: Bye Bye [preauth] Jan 13 12:23:29 host sshd[11123]: Disconnected from 190.131.255.12 port 49699 [preauth] Jan 13 12:23:30 host sshd[11126]: Failed password for invalid user camtest from 116.181.16.47 port 47566 ssh2 Jan 13 12:23:30 host sshd[11126]: Received disconnect from 116.181.16.47 port 47566:11: Bye Bye [preauth] Jan 13 12:23:30 host sshd[11126]: Disconnected from 116.181.16.47 port 47566 [preauth] Jan 13 12:23:52 host sshd[11189]: Invalid user yarn from 198.199.119.203 port 34586 Jan 13 12:23:52 host sshd[11189]: input_userauth_request: invalid user yarn [preauth] Jan 13 12:23:52 host sshd[11189]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:23:52 host sshd[11189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.119.203 Jan 13 12:23:53 host sshd[11193]: Invalid user dk from 194.110.203.109 port 57112 Jan 13 12:23:53 host sshd[11193]: input_userauth_request: invalid user dk [preauth] Jan 13 12:23:53 host sshd[11193]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:23:53 host sshd[11193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 12:23:54 host sshd[11189]: Failed password for invalid user yarn from 198.199.119.203 port 34586 ssh2 Jan 13 12:23:54 host sshd[11189]: Received disconnect from 198.199.119.203 port 34586:11: Bye Bye [preauth] Jan 13 12:23:54 host sshd[11189]: Disconnected from 198.199.119.203 port 34586 [preauth] Jan 13 12:23:55 host sshd[11193]: Failed password for invalid user dk from 194.110.203.109 port 57112 ssh2 Jan 13 12:23:59 host sshd[11193]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:24:00 host sshd[11193]: Failed password for invalid user dk from 194.110.203.109 port 57112 ssh2 Jan 13 12:24:04 host sshd[11193]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:24:06 host sshd[11193]: Failed password for invalid user dk from 194.110.203.109 port 57112 ssh2 Jan 13 12:24:07 host sshd[11224]: Invalid user tys from 143.110.159.165 port 51842 Jan 13 12:24:07 host sshd[11224]: input_userauth_request: invalid user tys [preauth] Jan 13 12:24:07 host sshd[11224]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:24:07 host sshd[11224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.159.165 Jan 13 12:24:08 host sshd[11227]: Invalid user zxu from 167.235.243.187 port 53506 Jan 13 12:24:08 host sshd[11227]: input_userauth_request: invalid user zxu [preauth] Jan 13 12:24:08 host sshd[11227]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:24:08 host sshd[11227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.243.187 Jan 13 12:24:09 host sshd[11233]: Invalid user postgres from 157.230.185.9 port 36438 Jan 13 12:24:09 host sshd[11233]: input_userauth_request: invalid user postgres [preauth] Jan 13 12:24:09 host sshd[11233]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:24:09 host sshd[11233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.185.9 Jan 13 12:24:09 host sshd[11193]: Connection closed by 194.110.203.109 port 57112 [preauth] Jan 13 12:24:09 host sshd[11193]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 12:24:09 host sshd[11224]: Failed password for invalid user tys from 143.110.159.165 port 51842 ssh2 Jan 13 12:24:10 host sshd[11235]: Invalid user tzq from 159.65.55.28 port 54428 Jan 13 12:24:10 host sshd[11235]: input_userauth_request: invalid user tzq [preauth] Jan 13 12:24:10 host sshd[11235]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:24:10 host sshd[11235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.55.28 Jan 13 12:24:10 host sshd[11224]: Received disconnect from 143.110.159.165 port 51842:11: Bye Bye [preauth] Jan 13 12:24:10 host sshd[11224]: Disconnected from 143.110.159.165 port 51842 [preauth] Jan 13 12:24:10 host sshd[11227]: Failed password for invalid user zxu from 167.235.243.187 port 53506 ssh2 Jan 13 12:24:10 host sshd[11227]: Received disconnect from 167.235.243.187 port 53506:11: Bye Bye [preauth] Jan 13 12:24:10 host sshd[11227]: Disconnected from 167.235.243.187 port 53506 [preauth] Jan 13 12:24:11 host sshd[11233]: Failed password for invalid user postgres from 157.230.185.9 port 36438 ssh2 Jan 13 12:24:11 host sshd[11233]: Received disconnect from 157.230.185.9 port 36438:11: Bye Bye [preauth] Jan 13 12:24:11 host sshd[11233]: Disconnected from 157.230.185.9 port 36438 [preauth] Jan 13 12:24:11 host sshd[11235]: Failed password for invalid user tzq from 159.65.55.28 port 54428 ssh2 Jan 13 12:24:11 host sshd[11235]: Received disconnect from 159.65.55.28 port 54428:11: Bye Bye [preauth] Jan 13 12:24:11 host sshd[11235]: Disconnected from 159.65.55.28 port 54428 [preauth] Jan 13 12:24:28 host sshd[11291]: Invalid user guest from 81.183.208.244 port 39576 Jan 13 12:24:28 host sshd[11291]: input_userauth_request: invalid user guest [preauth] Jan 13 12:24:28 host sshd[11291]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:24:28 host sshd[11291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.208.244 Jan 13 12:24:30 host sshd[11291]: Failed password for invalid user guest from 81.183.208.244 port 39576 ssh2 Jan 13 12:24:30 host sshd[11291]: Received disconnect from 81.183.208.244 port 39576:11: Bye Bye [preauth] Jan 13 12:24:30 host sshd[11291]: Disconnected from 81.183.208.244 port 39576 [preauth] Jan 13 12:24:35 host sshd[11358]: Invalid user teste from 159.65.171.230 port 50062 Jan 13 12:24:35 host sshd[11358]: input_userauth_request: invalid user teste [preauth] Jan 13 12:24:35 host sshd[11358]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:24:35 host sshd[11358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.171.230 Jan 13 12:24:37 host sshd[11358]: Failed password for invalid user teste from 159.65.171.230 port 50062 ssh2 Jan 13 12:24:37 host sshd[11358]: Received disconnect from 159.65.171.230 port 50062:11: Bye Bye [preauth] Jan 13 12:24:37 host sshd[11358]: Disconnected from 159.65.171.230 port 50062 [preauth] Jan 13 12:24:42 host sshd[11374]: Invalid user zhangxuan from 103.96.75.75 port 35152 Jan 13 12:24:42 host sshd[11374]: input_userauth_request: invalid user zhangxuan [preauth] Jan 13 12:24:42 host sshd[11374]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:24:42 host sshd[11374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.96.75.75 Jan 13 12:24:45 host sshd[11374]: Failed password for invalid user zhangxuan from 103.96.75.75 port 35152 ssh2 Jan 13 12:24:45 host sshd[11374]: Received disconnect from 103.96.75.75 port 35152:11: Bye Bye [preauth] Jan 13 12:24:45 host sshd[11374]: Disconnected from 103.96.75.75 port 35152 [preauth] Jan 13 12:24:51 host sshd[11395]: Invalid user nexidigital from 159.89.185.234 port 38800 Jan 13 12:24:51 host sshd[11395]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 12:24:51 host sshd[11395]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:24:51 host sshd[11395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 12:24:52 host sshd[11395]: Failed password for invalid user nexidigital from 159.89.185.234 port 38800 ssh2 Jan 13 12:24:53 host sshd[11432]: Invalid user zbw from 217.160.172.183 port 60442 Jan 13 12:24:53 host sshd[11432]: input_userauth_request: invalid user zbw [preauth] Jan 13 12:24:53 host sshd[11432]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:24:53 host sshd[11432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.172.183 Jan 13 12:24:54 host sshd[11395]: Connection closed by 159.89.185.234 port 38800 [preauth] Jan 13 12:24:56 host sshd[11432]: Failed password for invalid user zbw from 217.160.172.183 port 60442 ssh2 Jan 13 12:24:56 host sshd[11432]: Received disconnect from 217.160.172.183 port 60442:11: Bye Bye [preauth] Jan 13 12:24:56 host sshd[11432]: Disconnected from 217.160.172.183 port 60442 [preauth] Jan 13 12:25:04 host sshd[11506]: Invalid user tzq from 134.122.90.69 port 51330 Jan 13 12:25:04 host sshd[11506]: input_userauth_request: invalid user tzq [preauth] Jan 13 12:25:04 host sshd[11506]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:25:04 host sshd[11506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.90.69 Jan 13 12:25:06 host sshd[11506]: Failed password for invalid user tzq from 134.122.90.69 port 51330 ssh2 Jan 13 12:25:06 host sshd[11506]: Received disconnect from 134.122.90.69 port 51330:11: Bye Bye [preauth] Jan 13 12:25:06 host sshd[11506]: Disconnected from 134.122.90.69 port 51330 [preauth] Jan 13 12:25:15 host sshd[11525]: Invalid user sunmingxue from 167.235.243.187 port 53008 Jan 13 12:25:15 host sshd[11525]: input_userauth_request: invalid user sunmingxue [preauth] Jan 13 12:25:15 host sshd[11525]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:25:15 host sshd[11525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.243.187 Jan 13 12:25:17 host sshd[11525]: Failed password for invalid user sunmingxue from 167.235.243.187 port 53008 ssh2 Jan 13 12:25:17 host sshd[11525]: Received disconnect from 167.235.243.187 port 53008:11: Bye Bye [preauth] Jan 13 12:25:17 host sshd[11525]: Disconnected from 167.235.243.187 port 53008 [preauth] Jan 13 12:25:24 host sshd[11569]: Invalid user dddeng from 128.199.95.186 port 43088 Jan 13 12:25:24 host sshd[11569]: input_userauth_request: invalid user dddeng [preauth] Jan 13 12:25:24 host sshd[11569]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:25:24 host sshd[11569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.186 Jan 13 12:25:26 host sshd[11574]: Invalid user elastics from 106.51.76.221 port 22433 Jan 13 12:25:26 host sshd[11574]: input_userauth_request: invalid user elastics [preauth] Jan 13 12:25:26 host sshd[11574]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:25:26 host sshd[11574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.76.221 Jan 13 12:25:27 host sshd[11569]: Failed password for invalid user dddeng from 128.199.95.186 port 43088 ssh2 Jan 13 12:25:27 host sshd[11569]: Received disconnect from 128.199.95.186 port 43088:11: Bye Bye [preauth] Jan 13 12:25:27 host sshd[11569]: Disconnected from 128.199.95.186 port 43088 [preauth] Jan 13 12:25:28 host sshd[11574]: Failed password for invalid user elastics from 106.51.76.221 port 22433 ssh2 Jan 13 12:25:28 host sshd[11574]: Received disconnect from 106.51.76.221 port 22433:11: Bye Bye [preauth] Jan 13 12:25:28 host sshd[11574]: Disconnected from 106.51.76.221 port 22433 [preauth] Jan 13 12:25:31 host sshd[11603]: Invalid user yan from 51.250.84.137 port 43806 Jan 13 12:25:31 host sshd[11603]: input_userauth_request: invalid user yan [preauth] Jan 13 12:25:31 host sshd[11603]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:25:31 host sshd[11603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.84.137 Jan 13 12:25:33 host sshd[11603]: Failed password for invalid user yan from 51.250.84.137 port 43806 ssh2 Jan 13 12:25:33 host sshd[11603]: Received disconnect from 51.250.84.137 port 43806:11: Bye Bye [preauth] Jan 13 12:25:33 host sshd[11603]: Disconnected from 51.250.84.137 port 43806 [preauth] Jan 13 12:25:42 host sshd[11632]: User root from 159.65.171.230 not allowed because not listed in AllowUsers Jan 13 12:25:42 host sshd[11632]: input_userauth_request: invalid user root [preauth] Jan 13 12:25:42 host unix_chkpwd[11637]: password check failed for user (root) Jan 13 12:25:42 host sshd[11632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.171.230 user=root Jan 13 12:25:42 host sshd[11632]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:25:43 host sshd[11635]: Invalid user yan from 143.110.159.165 port 56882 Jan 13 12:25:43 host sshd[11635]: input_userauth_request: invalid user yan [preauth] Jan 13 12:25:43 host sshd[11635]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:25:43 host sshd[11635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.159.165 Jan 13 12:25:44 host sshd[11632]: Failed password for invalid user root from 159.65.171.230 port 49208 ssh2 Jan 13 12:25:45 host sshd[11635]: Failed password for invalid user yan from 143.110.159.165 port 56882 ssh2 Jan 13 12:25:45 host sshd[11635]: Received disconnect from 143.110.159.165 port 56882:11: Bye Bye [preauth] Jan 13 12:25:45 host sshd[11635]: Disconnected from 143.110.159.165 port 56882 [preauth] Jan 13 12:25:49 host sshd[11677]: Invalid user sunmingxue from 159.65.55.28 port 44510 Jan 13 12:25:49 host sshd[11677]: input_userauth_request: invalid user sunmingxue [preauth] Jan 13 12:25:49 host sshd[11677]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:25:49 host sshd[11677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.55.28 Jan 13 12:25:51 host sshd[11677]: Failed password for invalid user sunmingxue from 159.65.55.28 port 44510 ssh2 Jan 13 12:25:52 host sshd[11677]: Received disconnect from 159.65.55.28 port 44510:11: Bye Bye [preauth] Jan 13 12:25:52 host sshd[11677]: Disconnected from 159.65.55.28 port 44510 [preauth] Jan 13 12:26:04 host sshd[11712]: Invalid user yan from 134.122.90.69 port 45976 Jan 13 12:26:04 host sshd[11712]: input_userauth_request: invalid user yan [preauth] Jan 13 12:26:04 host sshd[11712]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:26:04 host sshd[11712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.90.69 Jan 13 12:26:05 host sshd[11712]: Failed password for invalid user yan from 134.122.90.69 port 45976 ssh2 Jan 13 12:26:05 host sshd[11712]: Received disconnect from 134.122.90.69 port 45976:11: Bye Bye [preauth] Jan 13 12:26:05 host sshd[11712]: Disconnected from 134.122.90.69 port 45976 [preauth] Jan 13 12:26:26 host sshd[11775]: User root from 116.181.16.47 not allowed because not listed in AllowUsers Jan 13 12:26:26 host sshd[11775]: input_userauth_request: invalid user root [preauth] Jan 13 12:26:26 host unix_chkpwd[11779]: password check failed for user (root) Jan 13 12:26:26 host sshd[11775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.181.16.47 user=root Jan 13 12:26:26 host sshd[11775]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:26:27 host sshd[11752]: User root from 93.41.224.191 not allowed because not listed in AllowUsers Jan 13 12:26:27 host sshd[11752]: input_userauth_request: invalid user root [preauth] Jan 13 12:26:27 host unix_chkpwd[11782]: password check failed for user (root) Jan 13 12:26:27 host sshd[11752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.41.224.191 user=root Jan 13 12:26:27 host sshd[11752]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:26:28 host sshd[11775]: Failed password for invalid user root from 116.181.16.47 port 50914 ssh2 Jan 13 12:26:28 host sshd[11783]: Invalid user ubuntu from 60.249.253.239 port 59038 Jan 13 12:26:28 host sshd[11783]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 12:26:28 host sshd[11783]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:26:28 host sshd[11783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.253.239 Jan 13 12:26:28 host sshd[11775]: Received disconnect from 116.181.16.47 port 50914:11: Bye Bye [preauth] Jan 13 12:26:28 host sshd[11775]: Disconnected from 116.181.16.47 port 50914 [preauth] Jan 13 12:26:28 host sshd[11752]: Failed password for invalid user root from 93.41.224.191 port 63720 ssh2 Jan 13 12:26:29 host sshd[11752]: Connection reset by 93.41.224.191 port 63720 [preauth] Jan 13 12:26:29 host sshd[11783]: Failed password for invalid user ubuntu from 60.249.253.239 port 59038 ssh2 Jan 13 12:26:30 host sshd[11783]: Connection reset by 60.249.253.239 port 59038 [preauth] Jan 13 12:26:38 host sshd[11853]: Invalid user zxu from 51.250.84.137 port 46032 Jan 13 12:26:38 host sshd[11853]: input_userauth_request: invalid user zxu [preauth] Jan 13 12:26:38 host sshd[11853]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:26:38 host sshd[11853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.84.137 Jan 13 12:26:40 host sshd[11853]: Failed password for invalid user zxu from 51.250.84.137 port 46032 ssh2 Jan 13 12:26:40 host sshd[11853]: Received disconnect from 51.250.84.137 port 46032:11: Bye Bye [preauth] Jan 13 12:26:40 host sshd[11853]: Disconnected from 51.250.84.137 port 46032 [preauth] Jan 13 12:26:45 host sshd[11896]: Invalid user tzq from 143.110.159.165 port 49942 Jan 13 12:26:45 host sshd[11896]: input_userauth_request: invalid user tzq [preauth] Jan 13 12:26:45 host sshd[11896]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:26:45 host sshd[11896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.159.165 Jan 13 12:26:47 host sshd[11896]: Failed password for invalid user tzq from 143.110.159.165 port 49942 ssh2 Jan 13 12:26:47 host sshd[11896]: Received disconnect from 143.110.159.165 port 49942:11: Bye Bye [preauth] Jan 13 12:26:47 host sshd[11896]: Disconnected from 143.110.159.165 port 49942 [preauth] Jan 13 12:26:53 host sshd[11940]: Invalid user zxd from 106.51.76.221 port 3064 Jan 13 12:26:53 host sshd[11940]: input_userauth_request: invalid user zxd [preauth] Jan 13 12:26:53 host sshd[11940]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:26:53 host sshd[11940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.76.221 Jan 13 12:26:54 host sshd[11940]: Failed password for invalid user zxd from 106.51.76.221 port 3064 ssh2 Jan 13 12:26:54 host sshd[11940]: Received disconnect from 106.51.76.221 port 3064:11: Bye Bye [preauth] Jan 13 12:26:54 host sshd[11940]: Disconnected from 106.51.76.221 port 3064 [preauth] Jan 13 12:27:05 host sshd[11996]: Invalid user weblogic from 159.65.55.28 port 50972 Jan 13 12:27:05 host sshd[11996]: input_userauth_request: invalid user weblogic [preauth] Jan 13 12:27:05 host sshd[11996]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:27:05 host sshd[11996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.55.28 Jan 13 12:27:07 host sshd[11996]: Failed password for invalid user weblogic from 159.65.55.28 port 50972 ssh2 Jan 13 12:27:07 host sshd[11996]: Received disconnect from 159.65.55.28 port 50972:11: Bye Bye [preauth] Jan 13 12:27:07 host sshd[11996]: Disconnected from 159.65.55.28 port 50972 [preauth] Jan 13 12:27:56 host sshd[12121]: User root from 218.147.235.177 not allowed because not listed in AllowUsers Jan 13 12:27:56 host sshd[12121]: input_userauth_request: invalid user root [preauth] Jan 13 12:27:56 host unix_chkpwd[12129]: password check failed for user (root) Jan 13 12:27:56 host sshd[12121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.147.235.177 user=root Jan 13 12:27:56 host sshd[12121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:27:58 host sshd[12121]: Failed password for invalid user root from 218.147.235.177 port 61548 ssh2 Jan 13 12:27:59 host unix_chkpwd[12134]: password check failed for user (root) Jan 13 12:27:59 host sshd[12121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:28:01 host sshd[12121]: Failed password for invalid user root from 218.147.235.177 port 61548 ssh2 Jan 13 12:28:02 host unix_chkpwd[12156]: password check failed for user (root) Jan 13 12:28:02 host sshd[12121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:28:04 host sshd[12121]: Failed password for invalid user root from 218.147.235.177 port 61548 ssh2 Jan 13 12:28:05 host unix_chkpwd[12168]: password check failed for user (root) Jan 13 12:28:05 host sshd[12121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:28:07 host sshd[12121]: Failed password for invalid user root from 218.147.235.177 port 61548 ssh2 Jan 13 12:28:08 host unix_chkpwd[12185]: password check failed for user (root) Jan 13 12:28:08 host sshd[12121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:28:10 host sshd[12121]: Failed password for invalid user root from 218.147.235.177 port 61548 ssh2 Jan 13 12:28:49 host sshd[12402]: User root from 190.128.230.98 not allowed because not listed in AllowUsers Jan 13 12:28:49 host sshd[12402]: input_userauth_request: invalid user root [preauth] Jan 13 12:28:49 host unix_chkpwd[12406]: password check failed for user (root) Jan 13 12:28:49 host sshd[12402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.230.98 user=root Jan 13 12:28:49 host sshd[12402]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:28:51 host sshd[12402]: Failed password for invalid user root from 190.128.230.98 port 51854 ssh2 Jan 13 12:28:51 host sshd[12402]: Received disconnect from 190.128.230.98 port 51854:11: Bye Bye [preauth] Jan 13 12:28:51 host sshd[12402]: Disconnected from 190.128.230.98 port 51854 [preauth] Jan 13 12:29:19 host sshd[12459]: Invalid user oraclete from 109.132.238.5 port 53786 Jan 13 12:29:19 host sshd[12459]: input_userauth_request: invalid user oraclete [preauth] Jan 13 12:29:19 host sshd[12459]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:29:19 host sshd[12459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.132.238.5 Jan 13 12:29:21 host sshd[12459]: Failed password for invalid user oraclete from 109.132.238.5 port 53786 ssh2 Jan 13 12:29:22 host sshd[12459]: Received disconnect from 109.132.238.5 port 53786:11: Bye Bye [preauth] Jan 13 12:29:22 host sshd[12459]: Disconnected from 109.132.238.5 port 53786 [preauth] Jan 13 12:30:16 host sshd[12611]: Invalid user ubuntu from 128.199.95.186 port 42476 Jan 13 12:30:16 host sshd[12611]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 12:30:16 host sshd[12611]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:30:16 host sshd[12611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.186 Jan 13 12:30:19 host sshd[12611]: Failed password for invalid user ubuntu from 128.199.95.186 port 42476 ssh2 Jan 13 12:30:19 host sshd[12611]: Received disconnect from 128.199.95.186 port 42476:11: Bye Bye [preauth] Jan 13 12:30:19 host sshd[12611]: Disconnected from 128.199.95.186 port 42476 [preauth] Jan 13 12:30:24 host sshd[12619]: Invalid user xuewen from 198.199.119.203 port 54780 Jan 13 12:30:24 host sshd[12619]: input_userauth_request: invalid user xuewen [preauth] Jan 13 12:30:24 host sshd[12619]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:30:24 host sshd[12619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.119.203 Jan 13 12:30:26 host sshd[12619]: Failed password for invalid user xuewen from 198.199.119.203 port 54780 ssh2 Jan 13 12:30:26 host sshd[12619]: Received disconnect from 198.199.119.203 port 54780:11: Bye Bye [preauth] Jan 13 12:30:26 host sshd[12619]: Disconnected from 198.199.119.203 port 54780 [preauth] Jan 13 12:30:45 host sshd[12675]: User root from 109.132.238.5 not allowed because not listed in AllowUsers Jan 13 12:30:45 host sshd[12675]: input_userauth_request: invalid user root [preauth] Jan 13 12:30:45 host unix_chkpwd[12679]: password check failed for user (root) Jan 13 12:30:45 host sshd[12675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.132.238.5 user=root Jan 13 12:30:45 host sshd[12675]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:30:47 host sshd[12675]: Failed password for invalid user root from 109.132.238.5 port 43400 ssh2 Jan 13 12:30:47 host sshd[12675]: Received disconnect from 109.132.238.5 port 43400:11: Bye Bye [preauth] Jan 13 12:30:47 host sshd[12675]: Disconnected from 109.132.238.5 port 43400 [preauth] Jan 13 12:31:06 host sshd[12739]: Invalid user ONTUSER from 121.185.153.152 port 33018 Jan 13 12:31:06 host sshd[12739]: input_userauth_request: invalid user ONTUSER [preauth] Jan 13 12:31:06 host sshd[12739]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:31:06 host sshd[12739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.185.153.152 Jan 13 12:31:08 host sshd[12739]: Failed password for invalid user ONTUSER from 121.185.153.152 port 33018 ssh2 Jan 13 12:31:09 host sshd[12739]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:31:11 host sshd[12739]: Failed password for invalid user ONTUSER from 121.185.153.152 port 33018 ssh2 Jan 13 12:31:14 host sshd[12739]: Failed password for invalid user ONTUSER from 121.185.153.152 port 33018 ssh2 Jan 13 12:31:27 host sshd[12767]: User root from 190.128.230.98 not allowed because not listed in AllowUsers Jan 13 12:31:27 host sshd[12767]: input_userauth_request: invalid user root [preauth] Jan 13 12:31:27 host unix_chkpwd[12773]: password check failed for user (root) Jan 13 12:31:27 host sshd[12767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.230.98 user=root Jan 13 12:31:27 host sshd[12767]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:31:29 host sshd[12767]: Failed password for invalid user root from 190.128.230.98 port 53858 ssh2 Jan 13 12:31:34 host sshd[12830]: Invalid user kalilinux from 198.199.119.203 port 55732 Jan 13 12:31:34 host sshd[12830]: input_userauth_request: invalid user kalilinux [preauth] Jan 13 12:31:34 host sshd[12830]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:31:34 host sshd[12830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.119.203 Jan 13 12:31:36 host sshd[12830]: Failed password for invalid user kalilinux from 198.199.119.203 port 55732 ssh2 Jan 13 12:31:36 host sshd[12830]: Received disconnect from 198.199.119.203 port 55732:11: Bye Bye [preauth] Jan 13 12:31:36 host sshd[12830]: Disconnected from 198.199.119.203 port 55732 [preauth] Jan 13 12:31:46 host sshd[12880]: Invalid user bml from 128.199.95.186 port 59322 Jan 13 12:31:46 host sshd[12880]: input_userauth_request: invalid user bml [preauth] Jan 13 12:31:46 host sshd[12880]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:31:46 host sshd[12880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.186 Jan 13 12:31:48 host sshd[12880]: Failed password for invalid user bml from 128.199.95.186 port 59322 ssh2 Jan 13 12:31:48 host sshd[12880]: Received disconnect from 128.199.95.186 port 59322:11: Bye Bye [preauth] Jan 13 12:31:48 host sshd[12880]: Disconnected from 128.199.95.186 port 59322 [preauth] Jan 13 12:34:06 host sshd[13185]: User root from 211.114.180.65 not allowed because not listed in AllowUsers Jan 13 12:34:06 host sshd[13185]: input_userauth_request: invalid user root [preauth] Jan 13 12:34:06 host unix_chkpwd[13190]: password check failed for user (root) Jan 13 12:34:06 host sshd[13185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.114.180.65 user=root Jan 13 12:34:06 host sshd[13185]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:34:09 host sshd[13185]: Failed password for invalid user root from 211.114.180.65 port 63041 ssh2 Jan 13 12:34:09 host unix_chkpwd[13200]: password check failed for user (root) Jan 13 12:34:09 host sshd[13185]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:34:11 host sshd[13185]: Failed password for invalid user root from 211.114.180.65 port 63041 ssh2 Jan 13 12:34:12 host unix_chkpwd[13210]: password check failed for user (root) Jan 13 12:34:12 host sshd[13185]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:34:14 host sshd[13185]: Failed password for invalid user root from 211.114.180.65 port 63041 ssh2 Jan 13 12:34:15 host unix_chkpwd[13215]: password check failed for user (root) Jan 13 12:34:15 host sshd[13185]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:34:17 host sshd[13185]: Failed password for invalid user root from 211.114.180.65 port 63041 ssh2 Jan 13 12:34:17 host unix_chkpwd[13221]: password check failed for user (root) Jan 13 12:34:17 host sshd[13185]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 12:34:19 host sshd[13185]: Failed password for invalid user root from 211.114.180.65 port 63041 ssh2 Jan 13 12:34:39 host sshd[13398]: Invalid user xueli from 112.31.56.247 port 2587 Jan 13 12:34:39 host sshd[13398]: input_userauth_request: invalid user xueli [preauth] Jan 13 12:34:39 host sshd[13398]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:34:39 host sshd[13398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.31.56.247 Jan 13 12:34:41 host sshd[13398]: Failed password for invalid user xueli from 112.31.56.247 port 2587 ssh2 Jan 13 12:34:42 host sshd[13398]: Received disconnect from 112.31.56.247 port 2587:11: Bye Bye [preauth] Jan 13 12:34:42 host sshd[13398]: Disconnected from 112.31.56.247 port 2587 [preauth] Jan 13 12:44:19 host sshd[14621]: Invalid user zhuzw from 112.31.56.247 port 2590 Jan 13 12:44:19 host sshd[14621]: input_userauth_request: invalid user zhuzw [preauth] Jan 13 12:44:19 host sshd[14621]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:44:19 host sshd[14621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.31.56.247 Jan 13 12:44:21 host sshd[14621]: Failed password for invalid user zhuzw from 112.31.56.247 port 2590 ssh2 Jan 13 12:44:22 host sshd[14621]: Received disconnect from 112.31.56.247 port 2590:11: Bye Bye [preauth] Jan 13 12:44:22 host sshd[14621]: Disconnected from 112.31.56.247 port 2590 [preauth] Jan 13 12:45:33 host sshd[14908]: Invalid user auktion from 112.31.56.247 port 2591 Jan 13 12:45:33 host sshd[14908]: input_userauth_request: invalid user auktion [preauth] Jan 13 12:45:33 host sshd[14908]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:45:33 host sshd[14908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.31.56.247 Jan 13 12:45:34 host sshd[14908]: Failed password for invalid user auktion from 112.31.56.247 port 2591 ssh2 Jan 13 12:45:53 host sshd[14974]: Invalid user vadmin from 49.229.50.27 port 55665 Jan 13 12:45:53 host sshd[14974]: input_userauth_request: invalid user vadmin [preauth] Jan 13 12:45:53 host sshd[14974]: pam_unix(sshd:auth): check pass; user unknown Jan 13 12:45:53 host sshd[14974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.229.50.27 Jan 13 12:45:55 host sshd[14974]: Failed password for invalid user vadmin from 49.229.50.27 port 55665 ssh2 Jan 13 12:45:56 host sshd[14974]: Connection reset by 49.229.50.27 port 55665 [preauth] Jan 13 13:00:24 host sshd[16926]: Connection reset by 175.205.176.197 port 49441 [preauth] Jan 13 13:07:19 host sshd[17957]: Connection reset by 125.228.31.169 port 54296 [preauth] Jan 13 13:07:36 host sshd[18009]: Invalid user vadmin from 114.33.231.20 port 43175 Jan 13 13:07:36 host sshd[18009]: input_userauth_request: invalid user vadmin [preauth] Jan 13 13:07:36 host sshd[18009]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:07:36 host sshd[18009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.231.20 Jan 13 13:07:38 host sshd[18009]: Failed password for invalid user vadmin from 114.33.231.20 port 43175 ssh2 Jan 13 13:07:39 host sshd[18009]: Connection reset by 114.33.231.20 port 43175 [preauth] Jan 13 13:08:41 host sshd[18183]: Invalid user dmdba from 47.49.38.20 port 44981 Jan 13 13:08:41 host sshd[18183]: input_userauth_request: invalid user dmdba [preauth] Jan 13 13:08:41 host sshd[18183]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:08:41 host sshd[18183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.49.38.20 Jan 13 13:08:43 host sshd[18183]: Failed password for invalid user dmdba from 47.49.38.20 port 44981 ssh2 Jan 13 13:08:45 host sshd[18183]: Failed password for invalid user dmdba from 47.49.38.20 port 44981 ssh2 Jan 13 13:08:45 host sshd[18183]: Connection closed by 47.49.38.20 port 44981 [preauth] Jan 13 13:10:14 host sshd[18372]: Invalid user ec2-user from 210.223.94.116 port 60328 Jan 13 13:10:14 host sshd[18372]: input_userauth_request: invalid user ec2-user [preauth] Jan 13 13:10:14 host sshd[18372]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:10:14 host sshd[18372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.223.94.116 Jan 13 13:10:16 host sshd[18372]: Failed password for invalid user ec2-user from 210.223.94.116 port 60328 ssh2 Jan 13 13:10:16 host sshd[18372]: Connection reset by 210.223.94.116 port 60328 [preauth] Jan 13 13:12:11 host sshd[18735]: User root from 86.98.52.152 not allowed because not listed in AllowUsers Jan 13 13:12:11 host sshd[18735]: input_userauth_request: invalid user root [preauth] Jan 13 13:12:11 host unix_chkpwd[18738]: password check failed for user (root) Jan 13 13:12:11 host sshd[18735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.98.52.152 user=root Jan 13 13:12:11 host sshd[18735]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 13:12:13 host sshd[18735]: Failed password for invalid user root from 86.98.52.152 port 44359 ssh2 Jan 13 13:12:13 host sshd[18735]: Received disconnect from 86.98.52.152 port 44359:11: Normal Shutdown, Thank you for playing [preauth] Jan 13 13:12:13 host sshd[18735]: Disconnected from 86.98.52.152 port 44359 [preauth] Jan 13 13:16:33 host sshd[19435]: Invalid user admin from 175.195.97.209 port 62494 Jan 13 13:16:33 host sshd[19435]: input_userauth_request: invalid user admin [preauth] Jan 13 13:16:33 host sshd[19435]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:16:33 host sshd[19435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.195.97.209 Jan 13 13:16:35 host sshd[19435]: Failed password for invalid user admin from 175.195.97.209 port 62494 ssh2 Jan 13 13:16:36 host sshd[19435]: Failed password for invalid user admin from 175.195.97.209 port 62494 ssh2 Jan 13 13:16:37 host sshd[19435]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:16:39 host sshd[19435]: Failed password for invalid user admin from 175.195.97.209 port 62494 ssh2 Jan 13 13:16:40 host sshd[19435]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:16:42 host sshd[19435]: Failed password for invalid user admin from 175.195.97.209 port 62494 ssh2 Jan 13 13:16:43 host sshd[19435]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:16:44 host sshd[19435]: Failed password for invalid user admin from 175.195.97.209 port 62494 ssh2 Jan 13 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=gifterman user-4=palco123 user-5=phmetals user-6=kottayamcalldriv user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=wwwkapin user-16=woodpeck user-17=wwwkmaorg user-18=remysagr user-19=disposeat user-20=wwwrmswll user-21=wwwresourcehunte user-22=keralaholi user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 13:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-T15mlTKNVVV6eBI3.~ Jan 13 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-T15mlTKNVVV6eBI3.~' Jan 13 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-T15mlTKNVVV6eBI3.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 13:22:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 13:22:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 13:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 13:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 13:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 13:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 13:22:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 13:22:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 13:26:23 host sshd[21128]: Invalid user oracle from 83.4.156.166 port 34889 Jan 13 13:26:23 host sshd[21128]: input_userauth_request: invalid user oracle [preauth] Jan 13 13:26:23 host sshd[21128]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:26:23 host sshd[21128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.4.156.166 Jan 13 13:26:25 host sshd[21128]: Failed password for invalid user oracle from 83.4.156.166 port 34889 ssh2 Jan 13 13:26:26 host sshd[21128]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:26:28 host sshd[21128]: Failed password for invalid user oracle from 83.4.156.166 port 34889 ssh2 Jan 13 13:26:29 host sshd[21128]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:26:31 host sshd[21128]: Failed password for invalid user oracle from 83.4.156.166 port 34889 ssh2 Jan 13 13:26:32 host sshd[21128]: Failed password for invalid user oracle from 83.4.156.166 port 34889 ssh2 Jan 13 13:26:32 host sshd[21128]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:26:34 host sshd[21128]: Failed password for invalid user oracle from 83.4.156.166 port 34889 ssh2 Jan 13 13:26:35 host sshd[21128]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:26:37 host sshd[21128]: Failed password for invalid user oracle from 83.4.156.166 port 34889 ssh2 Jan 13 13:26:37 host sshd[21128]: error: maximum authentication attempts exceeded for invalid user oracle from 83.4.156.166 port 34889 ssh2 [preauth] Jan 13 13:26:37 host sshd[21128]: Disconnecting: Too many authentication failures [preauth] Jan 13 13:26:37 host sshd[21128]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.4.156.166 Jan 13 13:26:37 host sshd[21128]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 13 13:26:55 host sshd[21131]: Invalid user user from 125.254.18.93 port 54997 Jan 13 13:26:55 host sshd[21131]: input_userauth_request: invalid user user [preauth] Jan 13 13:26:55 host sshd[21131]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:26:55 host sshd[21131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.254.18.93 Jan 13 13:26:57 host sshd[21131]: Failed password for invalid user user from 125.254.18.93 port 54997 ssh2 Jan 13 13:27:12 host sshd[21131]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:27:14 host sshd[21131]: Failed password for invalid user user from 125.254.18.93 port 54997 ssh2 Jan 13 13:27:20 host sshd[21131]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:27:22 host sshd[21131]: Failed password for invalid user user from 125.254.18.93 port 54997 ssh2 Jan 13 13:27:32 host sshd[21131]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:27:34 host sshd[21131]: Failed password for invalid user user from 125.254.18.93 port 54997 ssh2 Jan 13 13:30:47 host sshd[21741]: User root from 186.226.37.45 not allowed because not listed in AllowUsers Jan 13 13:30:47 host sshd[21741]: input_userauth_request: invalid user root [preauth] Jan 13 13:30:47 host unix_chkpwd[21745]: password check failed for user (root) Jan 13 13:30:47 host sshd[21741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.226.37.45 user=root Jan 13 13:30:47 host sshd[21741]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 13:30:49 host sshd[21741]: Failed password for invalid user root from 186.226.37.45 port 56973 ssh2 Jan 13 13:30:49 host sshd[21741]: Received disconnect from 186.226.37.45 port 56973:11: Bye Bye [preauth] Jan 13 13:30:49 host sshd[21741]: Disconnected from 186.226.37.45 port 56973 [preauth] Jan 13 13:36:30 host sshd[22627]: Invalid user wxhu from 186.226.37.45 port 53508 Jan 13 13:36:30 host sshd[22627]: input_userauth_request: invalid user wxhu [preauth] Jan 13 13:36:30 host sshd[22627]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:36:30 host sshd[22627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.226.37.45 Jan 13 13:36:32 host sshd[22627]: Failed password for invalid user wxhu from 186.226.37.45 port 53508 ssh2 Jan 13 13:36:32 host sshd[22627]: Received disconnect from 186.226.37.45 port 53508:11: Bye Bye [preauth] Jan 13 13:36:32 host sshd[22627]: Disconnected from 186.226.37.45 port 53508 [preauth] Jan 13 13:36:49 host sshd[22812]: Invalid user admin from 125.229.138.178 port 56848 Jan 13 13:36:49 host sshd[22812]: input_userauth_request: invalid user admin [preauth] Jan 13 13:36:49 host sshd[22812]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:36:49 host sshd[22812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.138.178 Jan 13 13:36:51 host sshd[22812]: Failed password for invalid user admin from 125.229.138.178 port 56848 ssh2 Jan 13 13:36:52 host sshd[22812]: Failed password for invalid user admin from 125.229.138.178 port 56848 ssh2 Jan 13 13:36:54 host sshd[22812]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:36:56 host sshd[22812]: Failed password for invalid user admin from 125.229.138.178 port 56848 ssh2 Jan 13 13:36:56 host sshd[22812]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:36:57 host sshd[22823]: Invalid user 157.230.224.126 from 86.98.52.152 port 47203 Jan 13 13:36:57 host sshd[22823]: input_userauth_request: invalid user 157.230.224.126 [preauth] Jan 13 13:36:57 host sshd[22823]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:36:57 host sshd[22823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.98.52.152 Jan 13 13:36:58 host sshd[22812]: Failed password for invalid user admin from 125.229.138.178 port 56848 ssh2 Jan 13 13:36:59 host sshd[22823]: Failed password for invalid user 157.230.224.126 from 86.98.52.152 port 47203 ssh2 Jan 13 13:36:59 host sshd[22823]: Received disconnect from 86.98.52.152 port 47203:11: Normal Shutdown, Thank you for playing [preauth] Jan 13 13:36:59 host sshd[22823]: Disconnected from 86.98.52.152 port 47203 [preauth] Jan 13 13:36:59 host sshd[22812]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:37:01 host sshd[22812]: Failed password for invalid user admin from 125.229.138.178 port 56848 ssh2 Jan 13 13:37:34 host sshd[22956]: User ftp from 31.195.194.186 not allowed because not listed in AllowUsers Jan 13 13:37:34 host sshd[22956]: input_userauth_request: invalid user ftp [preauth] Jan 13 13:37:35 host unix_chkpwd[22959]: password check failed for user (ftp) Jan 13 13:37:35 host sshd[22956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.195.194.186 user=ftp Jan 13 13:37:35 host sshd[22956]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 13 13:37:37 host sshd[22956]: Failed password for invalid user ftp from 31.195.194.186 port 32932 ssh2 Jan 13 13:37:37 host sshd[22956]: Connection closed by 31.195.194.186 port 32932 [preauth] Jan 13 13:38:26 host sshd[23028]: User root from 61.216.168.96 not allowed because not listed in AllowUsers Jan 13 13:38:26 host sshd[23028]: input_userauth_request: invalid user root [preauth] Jan 13 13:38:26 host unix_chkpwd[23031]: password check failed for user (root) Jan 13 13:38:26 host sshd[23028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.168.96 user=root Jan 13 13:38:26 host sshd[23028]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 13:38:28 host sshd[23028]: Failed password for invalid user root from 61.216.168.96 port 47807 ssh2 Jan 13 13:38:29 host unix_chkpwd[23056]: password check failed for user (root) Jan 13 13:38:29 host sshd[23028]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 13:38:31 host sshd[23028]: Failed password for invalid user root from 61.216.168.96 port 47807 ssh2 Jan 13 13:38:31 host unix_chkpwd[23059]: password check failed for user (root) Jan 13 13:38:31 host sshd[23028]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 13:38:33 host sshd[23028]: Failed password for invalid user root from 61.216.168.96 port 47807 ssh2 Jan 13 13:38:34 host unix_chkpwd[23062]: password check failed for user (root) Jan 13 13:38:34 host sshd[23028]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 13:38:35 host sshd[23028]: Failed password for invalid user root from 61.216.168.96 port 47807 ssh2 Jan 13 13:38:35 host unix_chkpwd[23088]: password check failed for user (root) Jan 13 13:38:35 host sshd[23028]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 13:38:37 host sshd[23028]: Failed password for invalid user root from 61.216.168.96 port 47807 ssh2 Jan 13 13:47:44 host sshd[24579]: Invalid user nexidigital from 159.89.185.234 port 34928 Jan 13 13:47:44 host sshd[24579]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 13:47:44 host sshd[24579]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:47:44 host sshd[24579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 13:47:46 host sshd[24579]: Failed password for invalid user nexidigital from 159.89.185.234 port 34928 ssh2 Jan 13 13:47:49 host sshd[24579]: Connection closed by 159.89.185.234 port 34928 [preauth] Jan 13 13:52:45 host sshd[25246]: User root from 62.219.154.148 not allowed because not listed in AllowUsers Jan 13 13:52:45 host sshd[25246]: input_userauth_request: invalid user root [preauth] Jan 13 13:52:45 host unix_chkpwd[25251]: password check failed for user (root) Jan 13 13:52:45 host sshd[25246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.219.154.148 user=root Jan 13 13:52:45 host sshd[25246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 13:52:48 host sshd[25246]: Failed password for invalid user root from 62.219.154.148 port 35976 ssh2 Jan 13 13:52:48 host unix_chkpwd[25256]: password check failed for user (root) Jan 13 13:52:48 host sshd[25246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 13:52:50 host sshd[25246]: Failed password for invalid user root from 62.219.154.148 port 35976 ssh2 Jan 13 13:52:51 host unix_chkpwd[25264]: password check failed for user (root) Jan 13 13:52:51 host sshd[25246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 13:52:54 host sshd[25246]: Failed password for invalid user root from 62.219.154.148 port 35976 ssh2 Jan 13 13:52:54 host unix_chkpwd[25270]: password check failed for user (root) Jan 13 13:52:54 host sshd[25246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 13:52:54 host sshd[25266]: Invalid user ubuntu from 218.161.93.185 port 34988 Jan 13 13:52:54 host sshd[25266]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 13:52:55 host sshd[25266]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:52:55 host sshd[25266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.161.93.185 Jan 13 13:52:57 host sshd[25246]: Failed password for invalid user root from 62.219.154.148 port 35976 ssh2 Jan 13 13:52:57 host sshd[25266]: Failed password for invalid user ubuntu from 218.161.93.185 port 34988 ssh2 Jan 13 13:52:58 host sshd[25266]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:53:00 host sshd[25266]: Failed password for invalid user ubuntu from 218.161.93.185 port 34988 ssh2 Jan 13 13:53:01 host sshd[25266]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:53:03 host sshd[25266]: Failed password for invalid user ubuntu from 218.161.93.185 port 34988 ssh2 Jan 13 13:53:04 host sshd[25266]: Failed password for invalid user ubuntu from 218.161.93.185 port 34988 ssh2 Jan 13 13:56:43 host sshd[25848]: Did not receive identification string from 34.216.102.86 port 40612 Jan 13 13:56:52 host sshd[25862]: Connection closed by 34.216.102.86 port 41970 [preauth] Jan 13 13:56:52 host sshd[25866]: Connection closed by 34.216.102.86 port 41930 [preauth] Jan 13 13:56:52 host sshd[25853]: Connection closed by 34.216.102.86 port 41944 [preauth] Jan 13 13:56:52 host sshd[25863]: Connection closed by 34.216.102.86 port 41978 [preauth] Jan 13 13:56:52 host sshd[25854]: Connection closed by 34.216.102.86 port 41976 [preauth] Jan 13 13:56:52 host sshd[25861]: Connection closed by 34.216.102.86 port 41972 [preauth] Jan 13 13:56:52 host sshd[25871]: Connection closed by 34.216.102.86 port 41938 [preauth] Jan 13 13:56:52 host sshd[25870]: Connection closed by 34.216.102.86 port 41966 [preauth] Jan 13 13:56:52 host sshd[25875]: Connection closed by 34.216.102.86 port 41940 [preauth] Jan 13 13:56:52 host sshd[25858]: Connection closed by 34.216.102.86 port 41974 [preauth] Jan 13 13:56:52 host sshd[25859]: Connection closed by 34.216.102.86 port 41962 [preauth] Jan 13 13:56:52 host sshd[25857]: Connection closed by 34.216.102.86 port 41918 [preauth] Jan 13 13:56:52 host sshd[25856]: Connection closed by 34.216.102.86 port 41926 [preauth] Jan 13 13:56:52 host sshd[25867]: Connection closed by 34.216.102.86 port 41916 [preauth] Jan 13 13:56:52 host sshd[25864]: Connection closed by 34.216.102.86 port 41910 [preauth] Jan 13 13:56:52 host sshd[25874]: Connection closed by 34.216.102.86 port 41942 [preauth] Jan 13 13:56:52 host sshd[25865]: Connection closed by 34.216.102.86 port 41952 [preauth] Jan 13 13:56:52 host sshd[25852]: Connection closed by 34.216.102.86 port 41954 [preauth] Jan 13 13:56:52 host sshd[25851]: Connection closed by 34.216.102.86 port 41924 [preauth] Jan 13 13:56:52 host sshd[25860]: Connection closed by 34.216.102.86 port 41914 [preauth] Jan 13 13:56:52 host sshd[25855]: Connection closed by 34.216.102.86 port 41950 [preauth] Jan 13 13:56:52 host sshd[25869]: Connection closed by 34.216.102.86 port 41920 [preauth] Jan 13 13:56:52 host sshd[25868]: Connection closed by 34.216.102.86 port 41912 [preauth] Jan 13 13:56:52 host sshd[25873]: Connection closed by 34.216.102.86 port 41948 [preauth] Jan 13 13:56:52 host sshd[25872]: Connection closed by 34.216.102.86 port 41928 [preauth] Jan 13 13:56:53 host sshd[25876]: Connection closed by 34.216.102.86 port 42428 [preauth] Jan 13 13:58:40 host sshd[26117]: Invalid user sFTPUser from 175.205.161.213 port 48370 Jan 13 13:58:40 host sshd[26117]: input_userauth_request: invalid user sFTPUser [preauth] Jan 13 13:58:40 host sshd[26117]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:58:40 host sshd[26117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.205.161.213 Jan 13 13:58:42 host sshd[26117]: Failed password for invalid user sFTPUser from 175.205.161.213 port 48370 ssh2 Jan 13 13:58:43 host sshd[26117]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:58:45 host sshd[26117]: Failed password for invalid user sFTPUser from 175.205.161.213 port 48370 ssh2 Jan 13 13:58:46 host sshd[26117]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:58:48 host sshd[26117]: Failed password for invalid user sFTPUser from 175.205.161.213 port 48370 ssh2 Jan 13 13:58:49 host sshd[26117]: Failed password for invalid user sFTPUser from 175.205.161.213 port 48370 ssh2 Jan 13 13:58:50 host sshd[26117]: pam_unix(sshd:auth): check pass; user unknown Jan 13 13:58:52 host sshd[26117]: Failed password for invalid user sFTPUser from 175.205.161.213 port 48370 ssh2 Jan 13 14:01:37 host sshd[26691]: Did not receive identification string from 8.219.76.192 port 61000 Jan 13 14:11:18 host sshd[28101]: Did not receive identification string from 47.253.89.109 port 33778 Jan 13 14:11:18 host sshd[28102]: Did not receive identification string from 47.253.89.109 port 33968 Jan 13 14:11:20 host sshd[28104]: User root from 47.253.89.109 not allowed because not listed in AllowUsers Jan 13 14:11:20 host sshd[28104]: input_userauth_request: invalid user root [preauth] Jan 13 14:11:21 host unix_chkpwd[28111]: password check failed for user (root) Jan 13 14:11:21 host sshd[28104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.253.89.109 user=root Jan 13 14:11:21 host sshd[28104]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 14:11:21 host sshd[28113]: Connection reset by 47.253.89.109 port 34750 [preauth] Jan 13 14:11:23 host sshd[28117]: Connection closed by 47.253.89.109 port 34892 [preauth] Jan 13 14:11:23 host sshd[28104]: Failed password for invalid user root from 47.253.89.109 port 34044 ssh2 Jan 13 14:11:23 host sshd[28104]: Connection closed by 47.253.89.109 port 34044 [preauth] Jan 13 14:13:33 host sshd[28571]: Invalid user dl from 194.110.203.109 port 34844 Jan 13 14:13:33 host sshd[28571]: input_userauth_request: invalid user dl [preauth] Jan 13 14:13:33 host sshd[28571]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:13:33 host sshd[28571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 14:13:34 host sshd[28571]: Failed password for invalid user dl from 194.110.203.109 port 34844 ssh2 Jan 13 14:13:37 host sshd[28571]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:13:40 host sshd[28571]: Failed password for invalid user dl from 194.110.203.109 port 34844 ssh2 Jan 13 14:13:43 host sshd[28571]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:13:45 host sshd[28571]: Failed password for invalid user dl from 194.110.203.109 port 34844 ssh2 Jan 13 14:13:48 host sshd[28571]: Connection closed by 194.110.203.109 port 34844 [preauth] Jan 13 14:13:48 host sshd[28571]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=palco123 user-4=gifterman user-5=phmetals user-6=kottayamcalldriv user-7=wwwletsstalkfood user-8=straightcurve user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=woodpeck user-16=wwwkapin user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=keralaholi user-21=wwwresourcehunte user-22=wwwrmswll user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 14:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-upAHIhaPnQySR8lO.~ Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-upAHIhaPnQySR8lO.~' Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-upAHIhaPnQySR8lO.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 14:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 14:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 14:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 14:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 14:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 14:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 14:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 14:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 14:24:51 host sshd[30618]: Invalid user ubuntu from 66.128.116.26 port 44664 Jan 13 14:24:51 host sshd[30618]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 14:24:51 host sshd[30618]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:24:51 host sshd[30618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.128.116.26 Jan 13 14:24:53 host sshd[30618]: Failed password for invalid user ubuntu from 66.128.116.26 port 44664 ssh2 Jan 13 14:24:54 host sshd[30618]: Connection closed by 66.128.116.26 port 44664 [preauth] Jan 13 14:35:45 host sshd[32138]: User root from 114.34.195.167 not allowed because not listed in AllowUsers Jan 13 14:35:45 host sshd[32138]: input_userauth_request: invalid user root [preauth] Jan 13 14:35:45 host unix_chkpwd[32142]: password check failed for user (root) Jan 13 14:35:45 host sshd[32138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.195.167 user=root Jan 13 14:35:45 host sshd[32138]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 14:35:47 host sshd[32138]: Failed password for invalid user root from 114.34.195.167 port 47840 ssh2 Jan 13 14:35:48 host unix_chkpwd[32146]: password check failed for user (root) Jan 13 14:35:48 host sshd[32138]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 14:35:50 host sshd[32138]: Failed password for invalid user root from 114.34.195.167 port 47840 ssh2 Jan 13 14:35:51 host unix_chkpwd[32159]: password check failed for user (root) Jan 13 14:35:51 host sshd[32138]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 14:35:53 host sshd[32138]: Failed password for invalid user root from 114.34.195.167 port 47840 ssh2 Jan 13 14:35:54 host sshd[32138]: Connection reset by 114.34.195.167 port 47840 [preauth] Jan 13 14:35:54 host sshd[32138]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.195.167 user=root Jan 13 14:40:16 host sshd[32752]: Invalid user admin from 61.224.16.73 port 33121 Jan 13 14:40:16 host sshd[32752]: input_userauth_request: invalid user admin [preauth] Jan 13 14:40:16 host sshd[32752]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:40:16 host sshd[32752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.224.16.73 Jan 13 14:40:18 host sshd[32752]: Failed password for invalid user admin from 61.224.16.73 port 33121 ssh2 Jan 13 14:40:24 host sshd[32752]: Failed password for invalid user admin from 61.224.16.73 port 33121 ssh2 Jan 13 14:40:26 host sshd[32752]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:40:27 host sshd[32752]: Failed password for invalid user admin from 61.224.16.73 port 33121 ssh2 Jan 13 14:40:28 host sshd[32752]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:40:30 host sshd[32752]: Failed password for invalid user admin from 61.224.16.73 port 33121 ssh2 Jan 13 14:40:30 host sshd[32752]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:40:32 host sshd[32752]: Failed password for invalid user admin from 61.224.16.73 port 33121 ssh2 Jan 13 14:40:33 host sshd[32752]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:40:34 host sshd[32752]: Failed password for invalid user admin from 61.224.16.73 port 33121 ssh2 Jan 13 14:40:34 host sshd[32752]: error: maximum authentication attempts exceeded for invalid user admin from 61.224.16.73 port 33121 ssh2 [preauth] Jan 13 14:40:34 host sshd[32752]: Disconnecting: Too many authentication failures [preauth] Jan 13 14:40:34 host sshd[32752]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.224.16.73 Jan 13 14:40:34 host sshd[32752]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 13 14:40:38 host sshd[368]: Connection reset by 218.146.197.85 port 61904 [preauth] Jan 13 14:44:05 host sshd[911]: Invalid user admin from 82.64.52.74 port 35672 Jan 13 14:44:05 host sshd[911]: input_userauth_request: invalid user admin [preauth] Jan 13 14:44:05 host sshd[911]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:44:05 host sshd[911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.52.74 Jan 13 14:44:08 host sshd[911]: Failed password for invalid user admin from 82.64.52.74 port 35672 ssh2 Jan 13 14:44:08 host sshd[911]: Failed password for invalid user admin from 82.64.52.74 port 35672 ssh2 Jan 13 14:44:10 host sshd[911]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:44:12 host sshd[911]: Failed password for invalid user admin from 82.64.52.74 port 35672 ssh2 Jan 13 14:44:12 host sshd[911]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:44:14 host sshd[911]: Failed password for invalid user admin from 82.64.52.74 port 35672 ssh2 Jan 13 14:44:15 host sshd[911]: pam_unix(sshd:auth): check pass; user unknown Jan 13 14:44:17 host sshd[911]: Failed password for invalid user admin from 82.64.52.74 port 35672 ssh2 Jan 13 15:04:35 host sshd[3914]: Invalid user pi from 88.138.153.178 port 37980 Jan 13 15:04:35 host sshd[3914]: input_userauth_request: invalid user pi [preauth] Jan 13 15:04:35 host sshd[3914]: pam_unix(sshd:auth): check pass; user unknown Jan 13 15:04:35 host sshd[3914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.138.153.178 Jan 13 15:04:35 host sshd[3915]: Invalid user pi from 88.138.153.178 port 37996 Jan 13 15:04:35 host sshd[3915]: input_userauth_request: invalid user pi [preauth] Jan 13 15:04:35 host sshd[3915]: pam_unix(sshd:auth): check pass; user unknown Jan 13 15:04:35 host sshd[3915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.138.153.178 Jan 13 15:04:36 host sshd[3914]: Failed password for invalid user pi from 88.138.153.178 port 37980 ssh2 Jan 13 15:04:37 host sshd[3914]: Connection closed by 88.138.153.178 port 37980 [preauth] Jan 13 15:04:37 host sshd[3915]: Failed password for invalid user pi from 88.138.153.178 port 37996 ssh2 Jan 13 15:04:37 host sshd[3915]: Connection closed by 88.138.153.178 port 37996 [preauth] Jan 13 15:07:34 host sshd[4395]: User root from 114.34.196.142 not allowed because not listed in AllowUsers Jan 13 15:07:34 host sshd[4395]: input_userauth_request: invalid user root [preauth] Jan 13 15:07:34 host unix_chkpwd[4398]: password check failed for user (root) Jan 13 15:07:34 host sshd[4395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.196.142 user=root Jan 13 15:07:34 host sshd[4395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:07:36 host sshd[4395]: Failed password for invalid user root from 114.34.196.142 port 35909 ssh2 Jan 13 15:07:36 host unix_chkpwd[4402]: password check failed for user (root) Jan 13 15:07:36 host sshd[4395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:07:38 host sshd[4395]: Failed password for invalid user root from 114.34.196.142 port 35909 ssh2 Jan 13 15:07:39 host unix_chkpwd[4411]: password check failed for user (root) Jan 13 15:07:39 host sshd[4395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:07:41 host sshd[4395]: Failed password for invalid user root from 114.34.196.142 port 35909 ssh2 Jan 13 15:07:42 host sshd[4395]: Connection reset by 114.34.196.142 port 35909 [preauth] Jan 13 15:07:42 host sshd[4395]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.196.142 user=root Jan 13 15:10:10 host sshd[4733]: Invalid user nexidigital from 159.89.185.234 port 59118 Jan 13 15:10:10 host sshd[4733]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 15:10:10 host sshd[4733]: pam_unix(sshd:auth): check pass; user unknown Jan 13 15:10:10 host sshd[4733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 15:10:11 host sshd[4733]: Failed password for invalid user nexidigital from 159.89.185.234 port 59118 ssh2 Jan 13 15:10:12 host sshd[4733]: Connection closed by 159.89.185.234 port 59118 [preauth] Jan 13 15:12:26 host sshd[5090]: User root from 85.47.128.10 not allowed because not listed in AllowUsers Jan 13 15:12:26 host sshd[5090]: input_userauth_request: invalid user root [preauth] Jan 13 15:12:26 host unix_chkpwd[5093]: password check failed for user (root) Jan 13 15:12:26 host sshd[5090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.47.128.10 user=root Jan 13 15:12:26 host sshd[5090]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:12:28 host sshd[5090]: Failed password for invalid user root from 85.47.128.10 port 3932 ssh2 Jan 13 15:12:29 host sshd[5090]: Connection closed by 85.47.128.10 port 3932 [preauth] Jan 13 15:15:02 host sshd[5402]: User root from 211.22.233.123 not allowed because not listed in AllowUsers Jan 13 15:15:02 host sshd[5402]: input_userauth_request: invalid user root [preauth] Jan 13 15:15:02 host unix_chkpwd[5406]: password check failed for user (root) Jan 13 15:15:02 host sshd[5402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.22.233.123 user=root Jan 13 15:15:02 host sshd[5402]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:15:04 host sshd[5402]: Failed password for invalid user root from 211.22.233.123 port 56847 ssh2 Jan 13 15:15:05 host unix_chkpwd[5412]: password check failed for user (root) Jan 13 15:15:05 host sshd[5402]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:15:06 host sshd[5402]: Failed password for invalid user root from 211.22.233.123 port 56847 ssh2 Jan 13 15:15:07 host unix_chkpwd[5418]: password check failed for user (root) Jan 13 15:15:07 host sshd[5402]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:15:09 host sshd[5402]: Failed password for invalid user root from 211.22.233.123 port 56847 ssh2 Jan 13 15:15:10 host unix_chkpwd[5422]: password check failed for user (root) Jan 13 15:15:10 host sshd[5402]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:15:12 host sshd[5402]: Failed password for invalid user root from 211.22.233.123 port 56847 ssh2 Jan 13 15:15:12 host unix_chkpwd[5425]: password check failed for user (root) Jan 13 15:15:12 host sshd[5402]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:15:14 host sshd[5402]: Failed password for invalid user root from 211.22.233.123 port 56847 ssh2 Jan 13 15:20:57 host sshd[6273]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 13 15:20:57 host sshd[6273]: input_userauth_request: invalid user root [preauth] Jan 13 15:20:57 host unix_chkpwd[6276]: password check failed for user (root) Jan 13 15:20:57 host sshd[6273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 13 15:20:57 host sshd[6273]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:20:59 host sshd[6273]: Failed password for invalid user root from 194.169.175.102 port 50986 ssh2 Jan 13 15:20:59 host sshd[6273]: Received disconnect from 194.169.175.102 port 50986:11: Client disconnecting normally [preauth] Jan 13 15:20:59 host sshd[6273]: Disconnected from 194.169.175.102 port 50986 [preauth] Jan 13 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=remysagr user-3=disposeat user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 15:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6kuqWrE4qTm29pZJ.~ Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6kuqWrE4qTm29pZJ.~' Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6kuqWrE4qTm29pZJ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 15:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 15:22:40 host sshd[6705]: Invalid user zyfwp from 114.26.72.178 port 40527 Jan 13 15:22:40 host sshd[6705]: input_userauth_request: invalid user zyfwp [preauth] Jan 13 15:22:40 host sshd[6705]: pam_unix(sshd:auth): check pass; user unknown Jan 13 15:22:40 host sshd[6705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.26.72.178 Jan 13 15:22:43 host sshd[6705]: Failed password for invalid user zyfwp from 114.26.72.178 port 40527 ssh2 Jan 13 15:22:43 host sshd[6705]: pam_unix(sshd:auth): check pass; user unknown Jan 13 15:22:46 host sshd[6705]: Failed password for invalid user zyfwp from 114.26.72.178 port 40527 ssh2 Jan 13 15:22:47 host sshd[6705]: pam_unix(sshd:auth): check pass; user unknown Jan 13 15:22:49 host sshd[6705]: Failed password for invalid user zyfwp from 114.26.72.178 port 40527 ssh2 Jan 13 15:22:49 host sshd[6705]: Connection closed by 114.26.72.178 port 40527 [preauth] Jan 13 15:22:49 host sshd[6705]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.26.72.178 Jan 13 15:24:20 host sshd[7053]: Bad packet length 3261356313. [preauth] Jan 13 15:24:20 host sshd[7053]: ssh_dispatch_run_fatal: Connection from 121.166.71.56 port 60036: message authentication code incorrect [preauth] Jan 13 15:39:46 host sshd[9120]: User root from 220.94.209.15 not allowed because not listed in AllowUsers Jan 13 15:39:46 host sshd[9120]: input_userauth_request: invalid user root [preauth] Jan 13 15:39:46 host unix_chkpwd[9127]: password check failed for user (root) Jan 13 15:39:46 host sshd[9120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.94.209.15 user=root Jan 13 15:39:46 host sshd[9120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:39:47 host sshd[9120]: Failed password for invalid user root from 220.94.209.15 port 49273 ssh2 Jan 13 15:39:50 host unix_chkpwd[9133]: password check failed for user (root) Jan 13 15:39:50 host sshd[9120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:39:52 host sshd[9120]: Failed password for invalid user root from 220.94.209.15 port 49273 ssh2 Jan 13 15:39:56 host unix_chkpwd[9139]: password check failed for user (root) Jan 13 15:39:56 host sshd[9120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:39:58 host sshd[9120]: Failed password for invalid user root from 220.94.209.15 port 49273 ssh2 Jan 13 15:39:59 host unix_chkpwd[9142]: password check failed for user (root) Jan 13 15:39:59 host sshd[9120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:40:01 host sshd[9120]: Failed password for invalid user root from 220.94.209.15 port 49273 ssh2 Jan 13 15:53:15 host sshd[11098]: User root from 114.33.68.34 not allowed because not listed in AllowUsers Jan 13 15:53:15 host sshd[11098]: input_userauth_request: invalid user root [preauth] Jan 13 15:53:15 host unix_chkpwd[11104]: password check failed for user (root) Jan 13 15:53:15 host sshd[11098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.68.34 user=root Jan 13 15:53:15 host sshd[11098]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:53:17 host sshd[11098]: Failed password for invalid user root from 114.33.68.34 port 53877 ssh2 Jan 13 15:53:18 host unix_chkpwd[11108]: password check failed for user (root) Jan 13 15:53:18 host sshd[11098]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:53:20 host sshd[11098]: Failed password for invalid user root from 114.33.68.34 port 53877 ssh2 Jan 13 15:53:21 host unix_chkpwd[11115]: password check failed for user (root) Jan 13 15:53:21 host sshd[11098]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:53:24 host sshd[11098]: Failed password for invalid user root from 114.33.68.34 port 53877 ssh2 Jan 13 15:53:25 host unix_chkpwd[11120]: password check failed for user (root) Jan 13 15:53:25 host sshd[11098]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 15:53:27 host sshd[11098]: Failed password for invalid user root from 114.33.68.34 port 53877 ssh2 Jan 13 15:55:03 host sshd[11330]: Invalid user clarence from 107.189.30.59 port 58492 Jan 13 15:55:03 host sshd[11330]: input_userauth_request: invalid user clarence [preauth] Jan 13 15:55:03 host sshd[11330]: pam_unix(sshd:auth): check pass; user unknown Jan 13 15:55:03 host sshd[11330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 13 15:55:06 host sshd[11330]: Failed password for invalid user clarence from 107.189.30.59 port 58492 ssh2 Jan 13 15:55:06 host sshd[11330]: Connection closed by 107.189.30.59 port 58492 [preauth] Jan 13 16:00:11 host sshd[12101]: User sshd from 85.47.128.10 not allowed because not listed in AllowUsers Jan 13 16:00:11 host sshd[12101]: input_userauth_request: invalid user sshd [preauth] Jan 13 16:00:12 host unix_chkpwd[12106]: password check failed for user (sshd) Jan 13 16:00:12 host sshd[12101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.47.128.10 user=sshd Jan 13 16:00:12 host sshd[12101]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 13 16:00:14 host sshd[12101]: Failed password for invalid user sshd from 85.47.128.10 port 3212 ssh2 Jan 13 16:00:14 host sshd[12101]: Connection closed by 85.47.128.10 port 3212 [preauth] Jan 13 16:02:38 host sshd[12462]: Invalid user dm from 194.110.203.109 port 34288 Jan 13 16:02:38 host sshd[12462]: input_userauth_request: invalid user dm [preauth] Jan 13 16:02:38 host sshd[12462]: pam_unix(sshd:auth): check pass; user unknown Jan 13 16:02:38 host sshd[12462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 16:02:40 host sshd[12462]: Failed password for invalid user dm from 194.110.203.109 port 34288 ssh2 Jan 13 16:02:43 host sshd[12462]: pam_unix(sshd:auth): check pass; user unknown Jan 13 16:02:45 host sshd[12462]: Failed password for invalid user dm from 194.110.203.109 port 34288 ssh2 Jan 13 16:02:48 host sshd[12462]: pam_unix(sshd:auth): check pass; user unknown Jan 13 16:02:50 host sshd[12462]: Failed password for invalid user dm from 194.110.203.109 port 34288 ssh2 Jan 13 16:02:54 host sshd[12462]: Connection closed by 194.110.203.109 port 34288 [preauth] Jan 13 16:02:54 host sshd[12462]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 16:16:28 host sshd[14463]: Invalid user nginx from 121.159.171.181 port 47790 Jan 13 16:16:28 host sshd[14463]: input_userauth_request: invalid user nginx [preauth] Jan 13 16:16:28 host sshd[14463]: pam_unix(sshd:auth): check pass; user unknown Jan 13 16:16:28 host sshd[14463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.159.171.181 Jan 13 16:16:30 host sshd[14463]: Failed password for invalid user nginx from 121.159.171.181 port 47790 ssh2 Jan 13 16:16:30 host sshd[14463]: pam_unix(sshd:auth): check pass; user unknown Jan 13 16:16:33 host sshd[14463]: Failed password for invalid user nginx from 121.159.171.181 port 47790 ssh2 Jan 13 16:16:33 host sshd[14463]: Connection reset by 121.159.171.181 port 47790 [preauth] Jan 13 16:16:33 host sshd[14463]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.159.171.181 Jan 13 16:19:25 host sshd[14810]: Connection reset by 59.126.164.3 port 38297 [preauth] Jan 13 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=kottayamcalldriv user-19=phmetals user-20=palco123 user-21=gifterman user-22=woodpeck user-23=wwwkapin user-24=wwwkmaorg user-25=disposeat user-26=remysagr user-27=pmcresources user-28=shalinijames user-29=wwwtestugo user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 16:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gnzN91ps5TkJCnlL.~ Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gnzN91ps5TkJCnlL.~' Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gnzN91ps5TkJCnlL.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 16:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 16:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 16:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 16:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 16:33:26 host sshd[17143]: Invalid user nexidigital from 159.89.185.234 port 54934 Jan 13 16:33:26 host sshd[17143]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 16:33:26 host sshd[17143]: pam_unix(sshd:auth): check pass; user unknown Jan 13 16:33:26 host sshd[17143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 16:33:29 host sshd[17143]: Failed password for invalid user nexidigital from 159.89.185.234 port 54934 ssh2 Jan 13 16:33:30 host sshd[17143]: Connection closed by 159.89.185.234 port 54934 [preauth] Jan 13 16:37:36 host sshd[17970]: Invalid user gitlab-runner from 123.222.140.205 port 33504 Jan 13 16:37:36 host sshd[17970]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 13 16:37:36 host sshd[17970]: pam_unix(sshd:auth): check pass; user unknown Jan 13 16:37:36 host sshd[17970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.222.140.205 Jan 13 16:37:38 host sshd[17970]: Failed password for invalid user gitlab-runner from 123.222.140.205 port 33504 ssh2 Jan 13 16:37:40 host sshd[17970]: pam_unix(sshd:auth): check pass; user unknown Jan 13 16:37:42 host sshd[17970]: Failed password for invalid user gitlab-runner from 123.222.140.205 port 33504 ssh2 Jan 13 16:37:42 host sshd[17970]: pam_unix(sshd:auth): check pass; user unknown Jan 13 16:37:45 host sshd[17970]: Failed password for invalid user gitlab-runner from 123.222.140.205 port 33504 ssh2 Jan 13 16:37:46 host sshd[17970]: Failed password for invalid user gitlab-runner from 123.222.140.205 port 33504 ssh2 Jan 13 16:37:47 host sshd[17970]: Connection closed by 123.222.140.205 port 33504 [preauth] Jan 13 16:37:47 host sshd[17970]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.222.140.205 Jan 13 16:58:51 host sshd[21176]: Invalid user ONTUSER from 125.229.177.167 port 60672 Jan 13 16:58:51 host sshd[21176]: input_userauth_request: invalid user ONTUSER [preauth] Jan 13 16:58:51 host sshd[21176]: pam_unix(sshd:auth): check pass; user unknown Jan 13 16:58:51 host sshd[21176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.177.167 Jan 13 16:58:53 host sshd[21176]: Failed password for invalid user ONTUSER from 125.229.177.167 port 60672 ssh2 Jan 13 16:58:54 host sshd[21176]: pam_unix(sshd:auth): check pass; user unknown Jan 13 16:58:56 host sshd[21176]: Failed password for invalid user ONTUSER from 125.229.177.167 port 60672 ssh2 Jan 13 16:58:57 host sshd[21176]: Failed password for invalid user ONTUSER from 125.229.177.167 port 60672 ssh2 Jan 13 16:58:58 host sshd[21176]: Connection closed by 125.229.177.167 port 60672 [preauth] Jan 13 16:58:58 host sshd[21176]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.177.167 Jan 13 17:01:25 host sshd[21590]: Invalid user username from 188.214.144.70 port 40178 Jan 13 17:01:25 host sshd[21590]: input_userauth_request: invalid user username [preauth] Jan 13 17:01:25 host sshd[21590]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:01:25 host sshd[21590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.214.144.70 Jan 13 17:01:27 host sshd[21590]: Failed password for invalid user username from 188.214.144.70 port 40178 ssh2 Jan 13 17:01:27 host sshd[21590]: Received disconnect from 188.214.144.70 port 40178:11: Bye Bye [preauth] Jan 13 17:01:27 host sshd[21590]: Disconnected from 188.214.144.70 port 40178 [preauth] Jan 13 17:01:40 host sshd[21630]: User root from 62.233.50.248 not allowed because not listed in AllowUsers Jan 13 17:01:40 host sshd[21630]: input_userauth_request: invalid user root [preauth] Jan 13 17:01:40 host unix_chkpwd[21634]: password check failed for user (root) Jan 13 17:01:40 host sshd[21630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 user=root Jan 13 17:01:40 host sshd[21630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:01:42 host sshd[21630]: Failed password for invalid user root from 62.233.50.248 port 5966 ssh2 Jan 13 17:01:42 host sshd[21630]: Received disconnect from 62.233.50.248 port 5966:11: Client disconnecting normally [preauth] Jan 13 17:01:42 host sshd[21630]: Disconnected from 62.233.50.248 port 5966 [preauth] Jan 13 17:01:43 host sshd[21637]: Invalid user service from 62.233.50.248 port 9158 Jan 13 17:01:43 host sshd[21637]: input_userauth_request: invalid user service [preauth] Jan 13 17:01:43 host sshd[21637]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:01:43 host sshd[21637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 13 17:01:45 host sshd[21637]: Failed password for invalid user service from 62.233.50.248 port 9158 ssh2 Jan 13 17:01:46 host sshd[21637]: Received disconnect from 62.233.50.248 port 9158:11: Client disconnecting normally [preauth] Jan 13 17:01:46 host sshd[21637]: Disconnected from 62.233.50.248 port 9158 [preauth] Jan 13 17:01:47 host sshd[21649]: Invalid user test from 62.233.50.248 port 12523 Jan 13 17:01:47 host sshd[21649]: input_userauth_request: invalid user test [preauth] Jan 13 17:01:47 host sshd[21649]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:01:47 host sshd[21649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 13 17:01:49 host sshd[21649]: Failed password for invalid user test from 62.233.50.248 port 12523 ssh2 Jan 13 17:02:18 host sshd[21734]: Invalid user fusion from 110.164.213.177 port 57486 Jan 13 17:02:18 host sshd[21734]: input_userauth_request: invalid user fusion [preauth] Jan 13 17:02:18 host sshd[21734]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:02:18 host sshd[21734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.213.177 Jan 13 17:02:20 host sshd[21734]: Failed password for invalid user fusion from 110.164.213.177 port 57486 ssh2 Jan 13 17:02:20 host sshd[21734]: Received disconnect from 110.164.213.177 port 57486:11: Bye Bye [preauth] Jan 13 17:02:20 host sshd[21734]: Disconnected from 110.164.213.177 port 57486 [preauth] Jan 13 17:03:23 host sshd[21857]: Invalid user it from 212.98.132.242 port 40677 Jan 13 17:03:23 host sshd[21857]: input_userauth_request: invalid user it [preauth] Jan 13 17:03:23 host sshd[21857]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:03:23 host sshd[21857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.98.132.242 Jan 13 17:03:25 host sshd[21857]: Failed password for invalid user it from 212.98.132.242 port 40677 ssh2 Jan 13 17:03:25 host sshd[21857]: Received disconnect from 212.98.132.242 port 40677:11: Bye Bye [preauth] Jan 13 17:03:25 host sshd[21857]: Disconnected from 212.98.132.242 port 40677 [preauth] Jan 13 17:04:48 host sshd[22047]: Connection reset by 118.44.18.129 port 36669 [preauth] Jan 13 17:04:54 host sshd[22062]: Invalid user haproxy from 158.160.38.134 port 41744 Jan 13 17:04:54 host sshd[22062]: input_userauth_request: invalid user haproxy [preauth] Jan 13 17:04:54 host sshd[22062]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:04:54 host sshd[22062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.38.134 Jan 13 17:04:57 host sshd[22062]: Failed password for invalid user haproxy from 158.160.38.134 port 41744 ssh2 Jan 13 17:04:57 host sshd[22062]: Received disconnect from 158.160.38.134 port 41744:11: Bye Bye [preauth] Jan 13 17:04:57 host sshd[22062]: Disconnected from 158.160.38.134 port 41744 [preauth] Jan 13 17:05:51 host sshd[22293]: User root from 43.131.36.157 not allowed because not listed in AllowUsers Jan 13 17:05:51 host sshd[22293]: input_userauth_request: invalid user root [preauth] Jan 13 17:05:51 host unix_chkpwd[22296]: password check failed for user (root) Jan 13 17:05:51 host sshd[22293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.36.157 user=root Jan 13 17:05:51 host sshd[22293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:05:53 host sshd[22293]: Failed password for invalid user root from 43.131.36.157 port 40802 ssh2 Jan 13 17:05:53 host sshd[22293]: Received disconnect from 43.131.36.157 port 40802:11: Bye Bye [preauth] Jan 13 17:05:53 host sshd[22293]: Disconnected from 43.131.36.157 port 40802 [preauth] Jan 13 17:06:17 host sshd[22335]: Invalid user seu from 143.198.75.234 port 56442 Jan 13 17:06:17 host sshd[22335]: input_userauth_request: invalid user seu [preauth] Jan 13 17:06:17 host sshd[22335]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:06:17 host sshd[22335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.75.234 Jan 13 17:06:18 host sshd[22335]: Failed password for invalid user seu from 143.198.75.234 port 56442 ssh2 Jan 13 17:06:18 host sshd[22335]: Received disconnect from 143.198.75.234 port 56442:11: Bye Bye [preauth] Jan 13 17:06:18 host sshd[22335]: Disconnected from 143.198.75.234 port 56442 [preauth] Jan 13 17:06:56 host sshd[22409]: User root from 188.214.144.70 not allowed because not listed in AllowUsers Jan 13 17:06:56 host sshd[22409]: input_userauth_request: invalid user root [preauth] Jan 13 17:06:56 host unix_chkpwd[22413]: password check failed for user (root) Jan 13 17:06:56 host sshd[22409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.214.144.70 user=root Jan 13 17:06:56 host sshd[22409]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:06:57 host sshd[22409]: Failed password for invalid user root from 188.214.144.70 port 40368 ssh2 Jan 13 17:06:58 host sshd[22409]: Received disconnect from 188.214.144.70 port 40368:11: Bye Bye [preauth] Jan 13 17:06:58 host sshd[22409]: Disconnected from 188.214.144.70 port 40368 [preauth] Jan 13 17:07:33 host sshd[22527]: Invalid user amax from 43.131.36.157 port 53202 Jan 13 17:07:33 host sshd[22527]: input_userauth_request: invalid user amax [preauth] Jan 13 17:07:33 host sshd[22527]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:07:33 host sshd[22527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.36.157 Jan 13 17:07:36 host sshd[22527]: Failed password for invalid user amax from 43.131.36.157 port 53202 ssh2 Jan 13 17:07:36 host sshd[22527]: Received disconnect from 43.131.36.157 port 53202:11: Bye Bye [preauth] Jan 13 17:07:36 host sshd[22527]: Disconnected from 43.131.36.157 port 53202 [preauth] Jan 13 17:07:37 host sshd[22534]: Invalid user combo1210 from 212.98.132.242 port 48498 Jan 13 17:07:37 host sshd[22534]: input_userauth_request: invalid user combo1210 [preauth] Jan 13 17:07:37 host sshd[22534]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:07:37 host sshd[22534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.98.132.242 Jan 13 17:07:39 host sshd[22534]: Failed password for invalid user combo1210 from 212.98.132.242 port 48498 ssh2 Jan 13 17:07:39 host sshd[22534]: Received disconnect from 212.98.132.242 port 48498:11: Bye Bye [preauth] Jan 13 17:07:39 host sshd[22534]: Disconnected from 212.98.132.242 port 48498 [preauth] Jan 13 17:08:13 host sshd[22625]: Invalid user beeline1 from 143.198.75.234 port 53526 Jan 13 17:08:13 host sshd[22625]: input_userauth_request: invalid user beeline1 [preauth] Jan 13 17:08:13 host sshd[22625]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:08:13 host sshd[22625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.75.234 Jan 13 17:08:15 host sshd[22625]: Failed password for invalid user beeline1 from 143.198.75.234 port 53526 ssh2 Jan 13 17:08:15 host sshd[22625]: Received disconnect from 143.198.75.234 port 53526:11: Bye Bye [preauth] Jan 13 17:08:15 host sshd[22625]: Disconnected from 143.198.75.234 port 53526 [preauth] Jan 13 17:09:05 host sshd[22742]: Invalid user zhengjun from 212.98.132.242 port 23691 Jan 13 17:09:05 host sshd[22742]: input_userauth_request: invalid user zhengjun [preauth] Jan 13 17:09:05 host sshd[22742]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:09:05 host sshd[22742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.98.132.242 Jan 13 17:09:07 host sshd[22742]: Failed password for invalid user zhengjun from 212.98.132.242 port 23691 ssh2 Jan 13 17:09:07 host sshd[22747]: User root from 110.164.213.177 not allowed because not listed in AllowUsers Jan 13 17:09:07 host sshd[22747]: input_userauth_request: invalid user root [preauth] Jan 13 17:09:07 host unix_chkpwd[22749]: password check failed for user (root) Jan 13 17:09:07 host sshd[22747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.213.177 user=root Jan 13 17:09:07 host sshd[22747]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:09:07 host sshd[22742]: Received disconnect from 212.98.132.242 port 23691:11: Bye Bye [preauth] Jan 13 17:09:07 host sshd[22742]: Disconnected from 212.98.132.242 port 23691 [preauth] Jan 13 17:09:09 host sshd[22747]: Failed password for invalid user root from 110.164.213.177 port 50800 ssh2 Jan 13 17:09:09 host sshd[22747]: Received disconnect from 110.164.213.177 port 50800:11: Bye Bye [preauth] Jan 13 17:09:09 host sshd[22747]: Disconnected from 110.164.213.177 port 50800 [preauth] Jan 13 17:09:20 host sshd[22822]: Invalid user xsiptv from 143.198.75.234 port 34590 Jan 13 17:09:20 host sshd[22822]: input_userauth_request: invalid user xsiptv [preauth] Jan 13 17:09:20 host sshd[22822]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:09:20 host sshd[22822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.75.234 Jan 13 17:09:23 host sshd[22822]: Failed password for invalid user xsiptv from 143.198.75.234 port 34590 ssh2 Jan 13 17:09:23 host sshd[22822]: Received disconnect from 143.198.75.234 port 34590:11: Bye Bye [preauth] Jan 13 17:09:23 host sshd[22822]: Disconnected from 143.198.75.234 port 34590 [preauth] Jan 13 17:10:35 host sshd[23045]: Invalid user combo1210 from 158.160.38.134 port 60680 Jan 13 17:10:35 host sshd[23045]: input_userauth_request: invalid user combo1210 [preauth] Jan 13 17:10:35 host sshd[23045]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:10:35 host sshd[23045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.38.134 Jan 13 17:10:37 host sshd[23045]: Failed password for invalid user combo1210 from 158.160.38.134 port 60680 ssh2 Jan 13 17:10:37 host sshd[23045]: Received disconnect from 158.160.38.134 port 60680:11: Bye Bye [preauth] Jan 13 17:10:37 host sshd[23045]: Disconnected from 158.160.38.134 port 60680 [preauth] Jan 13 17:12:54 host sshd[23413]: User root from 158.160.38.134 not allowed because not listed in AllowUsers Jan 13 17:12:54 host sshd[23413]: input_userauth_request: invalid user root [preauth] Jan 13 17:12:54 host unix_chkpwd[23419]: password check failed for user (root) Jan 13 17:12:54 host sshd[23413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.38.134 user=root Jan 13 17:12:54 host sshd[23413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:12:56 host sshd[23413]: Failed password for invalid user root from 158.160.38.134 port 47628 ssh2 Jan 13 17:12:56 host sshd[23413]: Received disconnect from 158.160.38.134 port 47628:11: Bye Bye [preauth] Jan 13 17:12:56 host sshd[23413]: Disconnected from 158.160.38.134 port 47628 [preauth] Jan 13 17:13:31 host sshd[23509]: User root from 1.220.244.142 not allowed because not listed in AllowUsers Jan 13 17:13:31 host sshd[23509]: input_userauth_request: invalid user root [preauth] Jan 13 17:13:31 host unix_chkpwd[23536]: password check failed for user (root) Jan 13 17:13:31 host sshd[23509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.220.244.142 user=root Jan 13 17:13:31 host sshd[23509]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:13:32 host sshd[23509]: Failed password for invalid user root from 1.220.244.142 port 36628 ssh2 Jan 13 17:13:33 host unix_chkpwd[23545]: password check failed for user (root) Jan 13 17:13:33 host sshd[23509]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:13:35 host sshd[23509]: Failed password for invalid user root from 1.220.244.142 port 36628 ssh2 Jan 13 17:13:36 host unix_chkpwd[23550]: password check failed for user (root) Jan 13 17:13:36 host sshd[23509]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:13:38 host sshd[23509]: Failed password for invalid user root from 1.220.244.142 port 36628 ssh2 Jan 13 17:13:39 host unix_chkpwd[23557]: password check failed for user (root) Jan 13 17:13:39 host sshd[23509]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:13:41 host sshd[23509]: Failed password for invalid user root from 1.220.244.142 port 36628 ssh2 Jan 13 17:13:42 host unix_chkpwd[23565]: password check failed for user (root) Jan 13 17:13:42 host sshd[23509]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:13:44 host sshd[23509]: Failed password for invalid user root from 1.220.244.142 port 36628 ssh2 Jan 13 17:18:47 host sshd[24232]: Invalid user admin from 121.152.234.38 port 62301 Jan 13 17:18:47 host sshd[24232]: input_userauth_request: invalid user admin [preauth] Jan 13 17:18:47 host sshd[24232]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:18:47 host sshd[24232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.152.234.38 Jan 13 17:18:49 host sshd[24232]: Failed password for invalid user admin from 121.152.234.38 port 62301 ssh2 Jan 13 17:18:50 host sshd[24232]: Failed password for invalid user admin from 121.152.234.38 port 62301 ssh2 Jan 13 17:18:51 host sshd[24232]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:18:53 host sshd[24232]: Failed password for invalid user admin from 121.152.234.38 port 62301 ssh2 Jan 13 17:18:53 host sshd[24232]: Connection reset by 121.152.234.38 port 62301 [preauth] Jan 13 17:18:53 host sshd[24232]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.152.234.38 Jan 13 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=wwwnexidigital user-21=mrsclean user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 17:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JT5lR7Eu919FZWiW.~ Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JT5lR7Eu919FZWiW.~' Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JT5lR7Eu919FZWiW.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 17:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 17:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 17:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 17:30:43 host sshd[26093]: User root from 194.180.49.94 not allowed because not listed in AllowUsers Jan 13 17:30:43 host sshd[26093]: input_userauth_request: invalid user root [preauth] Jan 13 17:30:43 host unix_chkpwd[26099]: password check failed for user (root) Jan 13 17:30:43 host sshd[26093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.49.94 user=root Jan 13 17:30:43 host sshd[26093]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:30:44 host sshd[26093]: Failed password for invalid user root from 194.180.49.94 port 54030 ssh2 Jan 13 17:34:12 host sshd[26587]: User root from 59.126.254.42 not allowed because not listed in AllowUsers Jan 13 17:34:12 host sshd[26587]: input_userauth_request: invalid user root [preauth] Jan 13 17:34:12 host unix_chkpwd[26590]: password check failed for user (root) Jan 13 17:34:12 host sshd[26587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.254.42 user=root Jan 13 17:34:12 host sshd[26587]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 17:34:15 host sshd[26587]: Failed password for invalid user root from 59.126.254.42 port 47201 ssh2 Jan 13 17:34:15 host sshd[26587]: Connection reset by 59.126.254.42 port 47201 [preauth] Jan 13 17:36:18 host sshd[26840]: Invalid user nginx from 61.76.221.155 port 61939 Jan 13 17:36:18 host sshd[26840]: input_userauth_request: invalid user nginx [preauth] Jan 13 17:36:18 host sshd[26840]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:36:18 host sshd[26840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.221.155 Jan 13 17:36:21 host sshd[26840]: Failed password for invalid user nginx from 61.76.221.155 port 61939 ssh2 Jan 13 17:36:22 host sshd[26840]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:36:24 host sshd[26840]: Failed password for invalid user nginx from 61.76.221.155 port 61939 ssh2 Jan 13 17:36:24 host sshd[26840]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:36:27 host sshd[26840]: Failed password for invalid user nginx from 61.76.221.155 port 61939 ssh2 Jan 13 17:36:29 host sshd[26840]: Failed password for invalid user nginx from 61.76.221.155 port 61939 ssh2 Jan 13 17:36:30 host sshd[26840]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:36:32 host sshd[26840]: Failed password for invalid user nginx from 61.76.221.155 port 61939 ssh2 Jan 13 17:36:33 host sshd[26840]: Connection reset by 61.76.221.155 port 61939 [preauth] Jan 13 17:36:33 host sshd[26840]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.221.155 Jan 13 17:36:33 host sshd[26840]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 13 17:38:59 host sshd[27295]: Invalid user admin from 220.133.23.116 port 60161 Jan 13 17:38:59 host sshd[27295]: input_userauth_request: invalid user admin [preauth] Jan 13 17:38:59 host sshd[27295]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:38:59 host sshd[27295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.23.116 Jan 13 17:39:01 host sshd[27295]: Failed password for invalid user admin from 220.133.23.116 port 60161 ssh2 Jan 13 17:39:01 host sshd[27295]: Failed password for invalid user admin from 220.133.23.116 port 60161 ssh2 Jan 13 17:39:03 host sshd[27295]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:39:04 host sshd[27295]: Failed password for invalid user admin from 220.133.23.116 port 60161 ssh2 Jan 13 17:39:05 host sshd[27295]: Connection reset by 220.133.23.116 port 60161 [preauth] Jan 13 17:39:05 host sshd[27295]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.23.116 Jan 13 17:39:38 host sshd[27388]: Invalid user user from 112.164.8.224 port 62551 Jan 13 17:39:38 host sshd[27388]: input_userauth_request: invalid user user [preauth] Jan 13 17:39:38 host sshd[27388]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:39:38 host sshd[27388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.164.8.224 Jan 13 17:39:40 host sshd[27388]: Failed password for invalid user user from 112.164.8.224 port 62551 ssh2 Jan 13 17:39:41 host sshd[27388]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:39:43 host sshd[27388]: Failed password for invalid user user from 112.164.8.224 port 62551 ssh2 Jan 13 17:39:43 host sshd[27388]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:39:46 host sshd[27388]: Failed password for invalid user user from 112.164.8.224 port 62551 ssh2 Jan 13 17:48:08 host sshd[28514]: Invalid user user from 108.190.228.18 port 63663 Jan 13 17:48:08 host sshd[28514]: input_userauth_request: invalid user user [preauth] Jan 13 17:48:08 host sshd[28514]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:48:08 host sshd[28514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.190.228.18 Jan 13 17:48:11 host sshd[28514]: Failed password for invalid user user from 108.190.228.18 port 63663 ssh2 Jan 13 17:48:11 host sshd[28514]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:48:13 host sshd[28514]: Failed password for invalid user user from 108.190.228.18 port 63663 ssh2 Jan 13 17:48:14 host sshd[28514]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:48:16 host sshd[28514]: Failed password for invalid user user from 108.190.228.18 port 63663 ssh2 Jan 13 17:48:17 host sshd[28514]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:48:19 host sshd[28514]: Failed password for invalid user user from 108.190.228.18 port 63663 ssh2 Jan 13 17:48:20 host sshd[28514]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:48:22 host sshd[28514]: Failed password for invalid user user from 108.190.228.18 port 63663 ssh2 Jan 13 17:48:23 host sshd[28514]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:48:25 host sshd[28514]: Failed password for invalid user user from 108.190.228.18 port 63663 ssh2 Jan 13 17:48:25 host sshd[28514]: error: maximum authentication attempts exceeded for invalid user user from 108.190.228.18 port 63663 ssh2 [preauth] Jan 13 17:48:25 host sshd[28514]: Disconnecting: Too many authentication failures [preauth] Jan 13 17:48:25 host sshd[28514]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.190.228.18 Jan 13 17:48:25 host sshd[28514]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 13 17:52:29 host sshd[29159]: Invalid user dn from 194.110.203.109 port 58190 Jan 13 17:52:29 host sshd[29159]: input_userauth_request: invalid user dn [preauth] Jan 13 17:52:29 host sshd[29159]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:52:29 host sshd[29159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 17:52:30 host sshd[29159]: Failed password for invalid user dn from 194.110.203.109 port 58190 ssh2 Jan 13 17:52:33 host sshd[29159]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:52:36 host sshd[29159]: Failed password for invalid user dn from 194.110.203.109 port 58190 ssh2 Jan 13 17:52:39 host sshd[29159]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:52:41 host sshd[29159]: Failed password for invalid user dn from 194.110.203.109 port 58190 ssh2 Jan 13 17:52:44 host sshd[29159]: Connection closed by 194.110.203.109 port 58190 [preauth] Jan 13 17:52:44 host sshd[29159]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 17:53:19 host sshd[29256]: Did not receive identification string from 223.245.0.5 port 34712 Jan 13 17:57:03 host sshd[29864]: Invalid user nexidigital from 159.89.185.234 port 50526 Jan 13 17:57:03 host sshd[29864]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 17:57:03 host sshd[29864]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:57:03 host sshd[29864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 17:57:05 host sshd[29864]: Failed password for invalid user nexidigital from 159.89.185.234 port 50526 ssh2 Jan 13 17:57:06 host sshd[29864]: Connection closed by 159.89.185.234 port 50526 [preauth] Jan 13 17:58:26 host sshd[30065]: Did not receive identification string from 141.105.66.212 port 46190 Jan 13 17:59:44 host sshd[30510]: Invalid user l-admin from 36.92.107.125 port 59964 Jan 13 17:59:44 host sshd[30510]: input_userauth_request: invalid user l-admin [preauth] Jan 13 17:59:44 host sshd[30510]: pam_unix(sshd:auth): check pass; user unknown Jan 13 17:59:44 host sshd[30510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.125 Jan 13 17:59:46 host sshd[30510]: Failed password for invalid user l-admin from 36.92.107.125 port 59964 ssh2 Jan 13 17:59:46 host sshd[30510]: Received disconnect from 36.92.107.125 port 59964:11: Bye Bye [preauth] Jan 13 17:59:46 host sshd[30510]: Disconnected from 36.92.107.125 port 59964 [preauth] Jan 13 17:59:52 host sshd[30579]: Protocol major versions differ for 141.105.66.212 port 46032: SSH-2.0-OpenSSH_7.4 vs. SSH-1.5-NmapNSE_1.0 Jan 13 17:59:52 host sshd[30578]: Connection closed by 141.105.66.212 port 46034 [preauth] Jan 13 17:59:53 host sshd[30584]: Protocol major versions differ for 141.105.66.212 port 46350: SSH-2.0-OpenSSH_7.4 vs. SSH-1.5-Nmap-SSH1-Hostkey Jan 13 17:59:54 host sshd[30590]: Unable to negotiate with 141.105.66.212 port 46682: no matching host key type found. Their offer: ssh-dss [preauth] Jan 13 17:59:54 host sshd[30602]: Did not receive identification string from 141.105.66.212 port 47238 Jan 13 17:59:55 host sshd[30599]: Connection closed by 141.105.66.212 port 46960 [preauth] Jan 13 18:00:06 host sshd[30610]: Did not receive identification string from 141.105.66.212 port 47582 Jan 13 18:00:28 host sshd[30730]: Invalid user nagios from 51.178.30.100 port 34042 Jan 13 18:00:28 host sshd[30730]: input_userauth_request: invalid user nagios [preauth] Jan 13 18:00:28 host sshd[30730]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:00:28 host sshd[30730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.30.100 Jan 13 18:00:30 host sshd[30730]: Failed password for invalid user nagios from 51.178.30.100 port 34042 ssh2 Jan 13 18:00:30 host sshd[30730]: Received disconnect from 51.178.30.100 port 34042:11: Bye Bye [preauth] Jan 13 18:00:30 host sshd[30730]: Disconnected from 51.178.30.100 port 34042 [preauth] Jan 13 18:00:38 host sshd[30774]: Invalid user buntu from 104.131.181.4 port 34154 Jan 13 18:00:38 host sshd[30774]: input_userauth_request: invalid user buntu [preauth] Jan 13 18:00:38 host sshd[30774]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:00:38 host sshd[30774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.181.4 Jan 13 18:00:40 host sshd[30774]: Failed password for invalid user buntu from 104.131.181.4 port 34154 ssh2 Jan 13 18:00:40 host sshd[30774]: Received disconnect from 104.131.181.4 port 34154:11: Bye Bye [preauth] Jan 13 18:00:40 host sshd[30774]: Disconnected from 104.131.181.4 port 34154 [preauth] Jan 13 18:01:23 host sshd[30885]: Invalid user onelink from 45.224.235.24 port 40372 Jan 13 18:01:23 host sshd[30885]: input_userauth_request: invalid user onelink [preauth] Jan 13 18:01:23 host sshd[30885]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:01:23 host sshd[30885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.235.24 Jan 13 18:01:25 host sshd[30885]: Failed password for invalid user onelink from 45.224.235.24 port 40372 ssh2 Jan 13 18:01:25 host sshd[30885]: Received disconnect from 45.224.235.24 port 40372:11: Bye Bye [preauth] Jan 13 18:01:25 host sshd[30885]: Disconnected from 45.224.235.24 port 40372 [preauth] Jan 13 18:01:53 host sshd[30956]: Invalid user user from 143.110.242.73 port 32803 Jan 13 18:01:53 host sshd[30956]: input_userauth_request: invalid user user [preauth] Jan 13 18:01:53 host sshd[30956]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:01:53 host sshd[30956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.242.73 Jan 13 18:01:55 host sshd[30956]: Failed password for invalid user user from 143.110.242.73 port 32803 ssh2 Jan 13 18:01:55 host sshd[30956]: Received disconnect from 143.110.242.73 port 32803:11: Bye Bye [preauth] Jan 13 18:01:55 host sshd[30956]: Disconnected from 143.110.242.73 port 32803 [preauth] Jan 13 18:03:10 host sshd[31119]: Invalid user jiawei from 175.126.176.18 port 47730 Jan 13 18:03:10 host sshd[31119]: input_userauth_request: invalid user jiawei [preauth] Jan 13 18:03:10 host sshd[31119]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:03:10 host sshd[31119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.18 Jan 13 18:03:13 host sshd[31119]: Failed password for invalid user jiawei from 175.126.176.18 port 47730 ssh2 Jan 13 18:03:13 host sshd[31119]: Received disconnect from 175.126.176.18 port 47730:11: Bye Bye [preauth] Jan 13 18:03:13 host sshd[31119]: Disconnected from 175.126.176.18 port 47730 [preauth] Jan 13 18:03:43 host sshd[31184]: Invalid user hyi from 49.248.17.3 port 40484 Jan 13 18:03:43 host sshd[31184]: input_userauth_request: invalid user hyi [preauth] Jan 13 18:03:43 host sshd[31184]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:03:43 host sshd[31184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.17.3 Jan 13 18:03:45 host sshd[31184]: Failed password for invalid user hyi from 49.248.17.3 port 40484 ssh2 Jan 13 18:03:45 host sshd[31184]: Received disconnect from 49.248.17.3 port 40484:11: Bye Bye [preauth] Jan 13 18:03:45 host sshd[31184]: Disconnected from 49.248.17.3 port 40484 [preauth] Jan 13 18:04:07 host sshd[31230]: Invalid user buntu from 140.213.1.117 port 12029 Jan 13 18:04:07 host sshd[31230]: input_userauth_request: invalid user buntu [preauth] Jan 13 18:04:07 host sshd[31230]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:04:07 host sshd[31230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.213.1.117 Jan 13 18:04:08 host sshd[31230]: Failed password for invalid user buntu from 140.213.1.117 port 12029 ssh2 Jan 13 18:04:08 host sshd[31230]: Received disconnect from 140.213.1.117 port 12029:11: Bye Bye [preauth] Jan 13 18:04:08 host sshd[31230]: Disconnected from 140.213.1.117 port 12029 [preauth] Jan 13 18:04:28 host sshd[31255]: Invalid user hyh from 157.245.154.129 port 54428 Jan 13 18:04:28 host sshd[31255]: input_userauth_request: invalid user hyh [preauth] Jan 13 18:04:28 host sshd[31255]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:04:28 host sshd[31255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.154.129 Jan 13 18:04:30 host sshd[31255]: Failed password for invalid user hyh from 157.245.154.129 port 54428 ssh2 Jan 13 18:04:30 host sshd[31255]: Received disconnect from 157.245.154.129 port 54428:11: Bye Bye [preauth] Jan 13 18:04:30 host sshd[31255]: Disconnected from 157.245.154.129 port 54428 [preauth] Jan 13 18:04:54 host sshd[31369]: User root from 84.201.173.172 not allowed because not listed in AllowUsers Jan 13 18:04:54 host sshd[31369]: input_userauth_request: invalid user root [preauth] Jan 13 18:04:54 host unix_chkpwd[31372]: password check failed for user (root) Jan 13 18:04:54 host sshd[31369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.173.172 user=root Jan 13 18:04:54 host sshd[31369]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:04:55 host sshd[31369]: Failed password for invalid user root from 84.201.173.172 port 43172 ssh2 Jan 13 18:04:56 host sshd[31369]: Received disconnect from 84.201.173.172 port 43172:11: Bye Bye [preauth] Jan 13 18:04:56 host sshd[31369]: Disconnected from 84.201.173.172 port 43172 [preauth] Jan 13 18:04:57 host sshd[31416]: Invalid user buntu from 52.178.155.67 port 1024 Jan 13 18:04:57 host sshd[31416]: input_userauth_request: invalid user buntu [preauth] Jan 13 18:04:57 host sshd[31416]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:04:57 host sshd[31416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.178.155.67 Jan 13 18:04:59 host sshd[31416]: Failed password for invalid user buntu from 52.178.155.67 port 1024 ssh2 Jan 13 18:04:59 host sshd[31416]: Received disconnect from 52.178.155.67 port 1024:11: Bye Bye [preauth] Jan 13 18:04:59 host sshd[31416]: Disconnected from 52.178.155.67 port 1024 [preauth] Jan 13 18:05:54 host sshd[31548]: Invalid user nagios from 35.221.82.156 port 49390 Jan 13 18:05:54 host sshd[31548]: input_userauth_request: invalid user nagios [preauth] Jan 13 18:05:54 host sshd[31548]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:05:54 host sshd[31548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.221.82.156 Jan 13 18:05:56 host sshd[31548]: Failed password for invalid user nagios from 35.221.82.156 port 49390 ssh2 Jan 13 18:05:56 host sshd[31548]: Received disconnect from 35.221.82.156 port 49390:11: Bye Bye [preauth] Jan 13 18:05:56 host sshd[31548]: Disconnected from 35.221.82.156 port 49390 [preauth] Jan 13 18:06:02 host sshd[31568]: User root from 51.178.30.100 not allowed because not listed in AllowUsers Jan 13 18:06:02 host sshd[31568]: input_userauth_request: invalid user root [preauth] Jan 13 18:06:02 host unix_chkpwd[31575]: password check failed for user (root) Jan 13 18:06:02 host sshd[31568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.30.100 user=root Jan 13 18:06:02 host sshd[31568]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:06:05 host sshd[31568]: Failed password for invalid user root from 51.178.30.100 port 60424 ssh2 Jan 13 18:06:05 host sshd[31568]: Received disconnect from 51.178.30.100 port 60424:11: Bye Bye [preauth] Jan 13 18:06:05 host sshd[31568]: Disconnected from 51.178.30.100 port 60424 [preauth] Jan 13 18:06:24 host sshd[31641]: Invalid user utente from 104.131.181.4 port 60400 Jan 13 18:06:24 host sshd[31641]: input_userauth_request: invalid user utente [preauth] Jan 13 18:06:24 host sshd[31641]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:06:24 host sshd[31641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.181.4 Jan 13 18:06:24 host sshd[31643]: Invalid user nagios from 84.201.173.172 port 43694 Jan 13 18:06:24 host sshd[31643]: input_userauth_request: invalid user nagios [preauth] Jan 13 18:06:24 host sshd[31643]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:06:24 host sshd[31643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.173.172 Jan 13 18:06:25 host sshd[31647]: User mail from 143.110.242.73 not allowed because not listed in AllowUsers Jan 13 18:06:25 host sshd[31647]: input_userauth_request: invalid user mail [preauth] Jan 13 18:06:25 host unix_chkpwd[31649]: password check failed for user (mail) Jan 13 18:06:25 host sshd[31647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.242.73 user=mail Jan 13 18:06:25 host sshd[31647]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail" Jan 13 18:06:26 host sshd[31641]: Failed password for invalid user utente from 104.131.181.4 port 60400 ssh2 Jan 13 18:06:26 host sshd[31641]: Received disconnect from 104.131.181.4 port 60400:11: Bye Bye [preauth] Jan 13 18:06:26 host sshd[31641]: Disconnected from 104.131.181.4 port 60400 [preauth] Jan 13 18:06:26 host sshd[31643]: Failed password for invalid user nagios from 84.201.173.172 port 43694 ssh2 Jan 13 18:06:26 host sshd[31643]: Received disconnect from 84.201.173.172 port 43694:11: Bye Bye [preauth] Jan 13 18:06:26 host sshd[31643]: Disconnected from 84.201.173.172 port 43694 [preauth] Jan 13 18:06:28 host sshd[31647]: Failed password for invalid user mail from 143.110.242.73 port 24382 ssh2 Jan 13 18:06:28 host sshd[31647]: Received disconnect from 143.110.242.73 port 24382:11: Bye Bye [preauth] Jan 13 18:06:28 host sshd[31647]: Disconnected from 143.110.242.73 port 24382 [preauth] Jan 13 18:06:42 host sshd[31747]: User root from 36.92.107.125 not allowed because not listed in AllowUsers Jan 13 18:06:42 host sshd[31747]: input_userauth_request: invalid user root [preauth] Jan 13 18:06:42 host unix_chkpwd[31750]: password check failed for user (root) Jan 13 18:06:42 host sshd[31747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.107.125 user=root Jan 13 18:06:42 host sshd[31747]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:06:44 host sshd[31747]: Failed password for invalid user root from 36.92.107.125 port 55188 ssh2 Jan 13 18:06:44 host sshd[31747]: Received disconnect from 36.92.107.125 port 55188:11: Bye Bye [preauth] Jan 13 18:06:44 host sshd[31747]: Disconnected from 36.92.107.125 port 55188 [preauth] Jan 13 18:06:45 host sshd[31765]: Invalid user wangtao from 49.248.17.3 port 46202 Jan 13 18:06:45 host sshd[31765]: input_userauth_request: invalid user wangtao [preauth] Jan 13 18:06:45 host sshd[31765]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:06:45 host sshd[31765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.17.3 Jan 13 18:06:47 host sshd[31765]: Failed password for invalid user wangtao from 49.248.17.3 port 46202 ssh2 Jan 13 18:06:48 host sshd[31765]: Received disconnect from 49.248.17.3 port 46202:11: Bye Bye [preauth] Jan 13 18:06:48 host sshd[31765]: Disconnected from 49.248.17.3 port 46202 [preauth] Jan 13 18:06:49 host sshd[31795]: User root from 140.213.1.117 not allowed because not listed in AllowUsers Jan 13 18:06:49 host sshd[31795]: input_userauth_request: invalid user root [preauth] Jan 13 18:06:49 host unix_chkpwd[31798]: password check failed for user (root) Jan 13 18:06:49 host sshd[31795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.213.1.117 user=root Jan 13 18:06:49 host sshd[31795]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:06:51 host sshd[31795]: Failed password for invalid user root from 140.213.1.117 port 21742 ssh2 Jan 13 18:06:51 host sshd[31795]: Received disconnect from 140.213.1.117 port 21742:11: Bye Bye [preauth] Jan 13 18:06:51 host sshd[31795]: Disconnected from 140.213.1.117 port 21742 [preauth] Jan 13 18:07:13 host sshd[31865]: Invalid user grid from 175.126.176.18 port 33590 Jan 13 18:07:13 host sshd[31865]: input_userauth_request: invalid user grid [preauth] Jan 13 18:07:13 host sshd[31865]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:07:13 host sshd[31865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.18 Jan 13 18:07:15 host sshd[31867]: Invalid user utente from 45.224.235.24 port 34382 Jan 13 18:07:15 host sshd[31867]: input_userauth_request: invalid user utente [preauth] Jan 13 18:07:15 host sshd[31867]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:07:15 host sshd[31867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.235.24 Jan 13 18:07:15 host sshd[31865]: Failed password for invalid user grid from 175.126.176.18 port 33590 ssh2 Jan 13 18:07:16 host sshd[31865]: Received disconnect from 175.126.176.18 port 33590:11: Bye Bye [preauth] Jan 13 18:07:16 host sshd[31865]: Disconnected from 175.126.176.18 port 33590 [preauth] Jan 13 18:07:17 host sshd[31867]: Failed password for invalid user utente from 45.224.235.24 port 34382 ssh2 Jan 13 18:07:18 host sshd[31867]: Received disconnect from 45.224.235.24 port 34382:11: Bye Bye [preauth] Jan 13 18:07:18 host sshd[31867]: Disconnected from 45.224.235.24 port 34382 [preauth] Jan 13 18:07:20 host sshd[31877]: Invalid user nagios from 52.178.155.67 port 1024 Jan 13 18:07:20 host sshd[31877]: input_userauth_request: invalid user nagios [preauth] Jan 13 18:07:20 host sshd[31877]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:07:20 host sshd[31877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.178.155.67 Jan 13 18:07:22 host sshd[31880]: User root from 35.221.82.156 not allowed because not listed in AllowUsers Jan 13 18:07:22 host sshd[31880]: input_userauth_request: invalid user root [preauth] Jan 13 18:07:22 host unix_chkpwd[31883]: password check failed for user (root) Jan 13 18:07:22 host sshd[31880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.221.82.156 user=root Jan 13 18:07:22 host sshd[31880]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:07:22 host sshd[31877]: Failed password for invalid user nagios from 52.178.155.67 port 1024 ssh2 Jan 13 18:07:22 host sshd[31877]: Received disconnect from 52.178.155.67 port 1024:11: Bye Bye [preauth] Jan 13 18:07:22 host sshd[31877]: Disconnected from 52.178.155.67 port 1024 [preauth] Jan 13 18:07:24 host sshd[31880]: Failed password for invalid user root from 35.221.82.156 port 48352 ssh2 Jan 13 18:07:24 host sshd[31880]: Received disconnect from 35.221.82.156 port 48352:11: Bye Bye [preauth] Jan 13 18:07:24 host sshd[31880]: Disconnected from 35.221.82.156 port 48352 [preauth] Jan 13 18:07:30 host sshd[31948]: Invalid user postgres from 157.245.154.129 port 60224 Jan 13 18:07:30 host sshd[31948]: input_userauth_request: invalid user postgres [preauth] Jan 13 18:07:30 host sshd[31948]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:07:30 host sshd[31948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.154.129 Jan 13 18:07:31 host sshd[31946]: Invalid user odin from 104.131.181.4 port 55302 Jan 13 18:07:31 host sshd[31946]: input_userauth_request: invalid user odin [preauth] Jan 13 18:07:31 host sshd[31946]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:07:31 host sshd[31946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.181.4 Jan 13 18:07:32 host sshd[31948]: Failed password for invalid user postgres from 157.245.154.129 port 60224 ssh2 Jan 13 18:07:32 host sshd[31948]: Received disconnect from 157.245.154.129 port 60224:11: Bye Bye [preauth] Jan 13 18:07:32 host sshd[31948]: Disconnected from 157.245.154.129 port 60224 [preauth] Jan 13 18:07:33 host sshd[31946]: Failed password for invalid user odin from 104.131.181.4 port 55302 ssh2 Jan 13 18:07:34 host sshd[31946]: Received disconnect from 104.131.181.4 port 55302:11: Bye Bye [preauth] Jan 13 18:07:34 host sshd[31946]: Disconnected from 104.131.181.4 port 55302 [preauth] Jan 13 18:08:16 host sshd[32056]: User root from 49.248.17.3 not allowed because not listed in AllowUsers Jan 13 18:08:16 host sshd[32056]: input_userauth_request: invalid user root [preauth] Jan 13 18:08:16 host unix_chkpwd[32058]: password check failed for user (root) Jan 13 18:08:16 host sshd[32056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.17.3 user=root Jan 13 18:08:16 host sshd[32056]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:08:19 host sshd[32056]: Failed password for invalid user root from 49.248.17.3 port 35330 ssh2 Jan 13 18:08:19 host sshd[32056]: Received disconnect from 49.248.17.3 port 35330:11: Bye Bye [preauth] Jan 13 18:08:19 host sshd[32056]: Disconnected from 49.248.17.3 port 35330 [preauth] Jan 13 18:08:29 host sshd[32122]: Invalid user hyi from 52.178.155.67 port 1024 Jan 13 18:08:29 host sshd[32122]: input_userauth_request: invalid user hyi [preauth] Jan 13 18:08:29 host sshd[32122]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:08:29 host sshd[32122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.178.155.67 Jan 13 18:08:31 host sshd[32122]: Failed password for invalid user hyi from 52.178.155.67 port 1024 ssh2 Jan 13 18:08:40 host sshd[32165]: User root from 175.126.176.18 not allowed because not listed in AllowUsers Jan 13 18:08:40 host sshd[32165]: input_userauth_request: invalid user root [preauth] Jan 13 18:08:40 host unix_chkpwd[32168]: password check failed for user (root) Jan 13 18:08:40 host sshd[32165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.18 user=root Jan 13 18:08:40 host sshd[32165]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:08:43 host sshd[32165]: Failed password for invalid user root from 175.126.176.18 port 60708 ssh2 Jan 13 18:08:43 host sshd[32165]: Received disconnect from 175.126.176.18 port 60708:11: Bye Bye [preauth] Jan 13 18:08:43 host sshd[32165]: Disconnected from 175.126.176.18 port 60708 [preauth] Jan 13 18:08:43 host sshd[32170]: Invalid user hyi from 45.224.235.24 port 33098 Jan 13 18:08:43 host sshd[32170]: input_userauth_request: invalid user hyi [preauth] Jan 13 18:08:43 host sshd[32170]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:08:43 host sshd[32170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.235.24 Jan 13 18:08:45 host sshd[32170]: Failed password for invalid user hyi from 45.224.235.24 port 33098 ssh2 Jan 13 18:08:45 host sshd[32170]: Received disconnect from 45.224.235.24 port 33098:11: Bye Bye [preauth] Jan 13 18:08:45 host sshd[32170]: Disconnected from 45.224.235.24 port 33098 [preauth] Jan 13 18:08:48 host sshd[32243]: Invalid user user from 157.245.154.129 port 54560 Jan 13 18:08:48 host sshd[32243]: input_userauth_request: invalid user user [preauth] Jan 13 18:08:48 host sshd[32243]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:08:48 host sshd[32243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.154.129 Jan 13 18:08:51 host sshd[32243]: Failed password for invalid user user from 157.245.154.129 port 54560 ssh2 Jan 13 18:09:03 host sshd[32292]: Connection closed by 66.175.213.4 port 33936 [preauth] Jan 13 18:09:05 host sshd[32314]: Connection closed by 66.175.213.4 port 33944 [preauth] Jan 13 18:09:07 host sshd[32318]: Connection closed by 66.175.213.4 port 19474 [preauth] Jan 13 18:12:02 host sshd[326]: Invalid user admin from 59.24.222.122 port 62226 Jan 13 18:12:02 host sshd[326]: input_userauth_request: invalid user admin [preauth] Jan 13 18:12:02 host sshd[326]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:12:02 host sshd[326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.222.122 Jan 13 18:12:04 host sshd[326]: Failed password for invalid user admin from 59.24.222.122 port 62226 ssh2 Jan 13 18:12:05 host sshd[326]: Failed password for invalid user admin from 59.24.222.122 port 62226 ssh2 Jan 13 18:12:06 host sshd[326]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:12:07 host sshd[347]: Invalid user admin from 114.33.22.250 port 35728 Jan 13 18:12:07 host sshd[347]: input_userauth_request: invalid user admin [preauth] Jan 13 18:12:07 host sshd[347]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:12:07 host sshd[347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.22.250 Jan 13 18:12:08 host sshd[326]: Failed password for invalid user admin from 59.24.222.122 port 62226 ssh2 Jan 13 18:12:09 host sshd[347]: Failed password for invalid user admin from 114.33.22.250 port 35728 ssh2 Jan 13 18:12:09 host sshd[326]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:12:09 host sshd[347]: Failed password for invalid user admin from 114.33.22.250 port 35728 ssh2 Jan 13 18:12:11 host sshd[347]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:12:11 host sshd[326]: Failed password for invalid user admin from 59.24.222.122 port 62226 ssh2 Jan 13 18:12:12 host sshd[326]: Connection reset by 59.24.222.122 port 62226 [preauth] Jan 13 18:12:12 host sshd[326]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.222.122 Jan 13 18:12:13 host sshd[347]: Failed password for invalid user admin from 114.33.22.250 port 35728 ssh2 Jan 13 18:12:14 host sshd[347]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:12:16 host sshd[347]: Failed password for invalid user admin from 114.33.22.250 port 35728 ssh2 Jan 13 18:12:17 host sshd[347]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:12:19 host sshd[347]: Failed password for invalid user admin from 114.33.22.250 port 35728 ssh2 Jan 13 18:12:20 host sshd[347]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:12:22 host sshd[347]: Failed password for invalid user admin from 114.33.22.250 port 35728 ssh2 Jan 13 18:12:22 host sshd[347]: error: maximum authentication attempts exceeded for invalid user admin from 114.33.22.250 port 35728 ssh2 [preauth] Jan 13 18:12:22 host sshd[347]: Disconnecting: Too many authentication failures [preauth] Jan 13 18:12:22 host sshd[347]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.22.250 Jan 13 18:12:22 host sshd[347]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 13 18:14:57 host sshd[750]: User bin from 205.185.113.129 not allowed because not listed in AllowUsers Jan 13 18:14:57 host sshd[750]: input_userauth_request: invalid user bin [preauth] Jan 13 18:14:58 host unix_chkpwd[754]: password check failed for user (bin) Jan 13 18:14:58 host sshd[750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 user=bin Jan 13 18:14:58 host sshd[750]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "bin" Jan 13 18:14:59 host sshd[750]: Failed password for invalid user bin from 205.185.113.129 port 38524 ssh2 Jan 13 18:15:00 host sshd[750]: Connection closed by 205.185.113.129 port 38524 [preauth] Jan 13 18:20:29 host sshd[1584]: Invalid user oracle from 122.116.171.100 port 56190 Jan 13 18:20:29 host sshd[1584]: input_userauth_request: invalid user oracle [preauth] Jan 13 18:20:29 host sshd[1584]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:20:29 host sshd[1584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.171.100 Jan 13 18:20:31 host sshd[1584]: Failed password for invalid user oracle from 122.116.171.100 port 56190 ssh2 Jan 13 18:20:31 host sshd[1584]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:20:34 host sshd[1584]: Failed password for invalid user oracle from 122.116.171.100 port 56190 ssh2 Jan 13 18:20:35 host sshd[1584]: Connection reset by 122.116.171.100 port 56190 [preauth] Jan 13 18:20:35 host sshd[1584]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.171.100 Jan 13 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 18:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=kottayamcalldriv user-19=phmetals user-20=gifterman user-21=palco123 user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=wwwtestugo user-29=shalinijames user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 18:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fwDW95G0LeDgYUx0.~ Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fwDW95G0LeDgYUx0.~' Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fwDW95G0LeDgYUx0.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 18:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 18:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 18:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 18:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 18:32:47 host sshd[3591]: User root from 220.134.15.90 not allowed because not listed in AllowUsers Jan 13 18:32:47 host sshd[3591]: input_userauth_request: invalid user root [preauth] Jan 13 18:32:47 host unix_chkpwd[3599]: password check failed for user (root) Jan 13 18:32:47 host sshd[3591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.15.90 user=root Jan 13 18:32:47 host sshd[3591]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:32:49 host sshd[3591]: Failed password for invalid user root from 220.134.15.90 port 39167 ssh2 Jan 13 18:32:49 host sshd[3591]: Connection reset by 220.134.15.90 port 39167 [preauth] Jan 13 18:40:19 host sshd[4637]: Did not receive identification string from 46.101.97.107 port 61000 Jan 13 18:41:31 host sshd[4823]: User root from 125.228.83.216 not allowed because not listed in AllowUsers Jan 13 18:41:31 host sshd[4823]: input_userauth_request: invalid user root [preauth] Jan 13 18:41:31 host unix_chkpwd[4827]: password check failed for user (root) Jan 13 18:41:31 host sshd[4823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.83.216 user=root Jan 13 18:41:31 host sshd[4823]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:41:33 host sshd[4823]: Failed password for invalid user root from 125.228.83.216 port 47624 ssh2 Jan 13 18:41:35 host unix_chkpwd[4835]: password check failed for user (root) Jan 13 18:41:35 host sshd[4823]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:41:37 host sshd[4823]: Failed password for invalid user root from 125.228.83.216 port 47624 ssh2 Jan 13 18:41:37 host unix_chkpwd[4839]: password check failed for user (root) Jan 13 18:41:37 host sshd[4823]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:41:39 host sshd[4823]: Failed password for invalid user root from 125.228.83.216 port 47624 ssh2 Jan 13 18:41:39 host sshd[4823]: Connection reset by 125.228.83.216 port 47624 [preauth] Jan 13 18:41:39 host sshd[4823]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.83.216 user=root Jan 13 18:45:21 host sshd[5543]: Connection reset by 59.126.171.136 port 57366 [preauth] Jan 13 18:50:59 host sshd[6668]: Invalid user vadmin from 119.196.10.118 port 62642 Jan 13 18:50:59 host sshd[6668]: input_userauth_request: invalid user vadmin [preauth] Jan 13 18:50:59 host sshd[6668]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:50:59 host sshd[6668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.10.118 Jan 13 18:51:01 host sshd[6668]: Failed password for invalid user vadmin from 119.196.10.118 port 62642 ssh2 Jan 13 18:51:03 host sshd[6668]: pam_unix(sshd:auth): check pass; user unknown Jan 13 18:51:05 host sshd[6668]: Failed password for invalid user vadmin from 119.196.10.118 port 62642 ssh2 Jan 13 18:51:06 host sshd[6668]: Failed password for invalid user vadmin from 119.196.10.118 port 62642 ssh2 Jan 13 18:55:01 host sshd[7432]: User root from 211.197.101.51 not allowed because not listed in AllowUsers Jan 13 18:55:01 host sshd[7432]: input_userauth_request: invalid user root [preauth] Jan 13 18:55:01 host unix_chkpwd[7439]: password check failed for user (root) Jan 13 18:55:01 host sshd[7432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.101.51 user=root Jan 13 18:55:01 host sshd[7432]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:55:02 host sshd[7432]: Failed password for invalid user root from 211.197.101.51 port 60986 ssh2 Jan 13 18:55:03 host unix_chkpwd[7463]: password check failed for user (root) Jan 13 18:55:03 host sshd[7432]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:55:05 host sshd[7432]: Failed password for invalid user root from 211.197.101.51 port 60986 ssh2 Jan 13 18:55:05 host unix_chkpwd[7473]: password check failed for user (root) Jan 13 18:55:05 host sshd[7432]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:55:07 host sshd[7432]: Failed password for invalid user root from 211.197.101.51 port 60986 ssh2 Jan 13 18:55:08 host unix_chkpwd[7482]: password check failed for user (root) Jan 13 18:55:08 host sshd[7432]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:55:10 host sshd[7432]: Failed password for invalid user root from 211.197.101.51 port 60986 ssh2 Jan 13 18:55:12 host unix_chkpwd[7494]: password check failed for user (root) Jan 13 18:55:12 host sshd[7432]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 18:55:14 host sshd[7432]: Failed password for invalid user root from 211.197.101.51 port 60986 ssh2 Jan 13 19:15:59 host sshd[10613]: Invalid user renjie from 148.66.132.190 port 43266 Jan 13 19:15:59 host sshd[10613]: input_userauth_request: invalid user renjie [preauth] Jan 13 19:15:59 host sshd[10613]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:15:59 host sshd[10613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190 Jan 13 19:16:01 host sshd[10613]: Failed password for invalid user renjie from 148.66.132.190 port 43266 ssh2 Jan 13 19:16:01 host sshd[10613]: Received disconnect from 148.66.132.190 port 43266:11: Bye Bye [preauth] Jan 13 19:16:01 host sshd[10613]: Disconnected from 148.66.132.190 port 43266 [preauth] Jan 13 19:18:12 host sshd[10876]: Invalid user zhh from 148.66.132.190 port 44070 Jan 13 19:18:12 host sshd[10876]: input_userauth_request: invalid user zhh [preauth] Jan 13 19:18:12 host sshd[10876]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:18:12 host sshd[10876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190 Jan 13 19:18:14 host sshd[10876]: Failed password for invalid user zhh from 148.66.132.190 port 44070 ssh2 Jan 13 19:18:15 host sshd[10876]: Received disconnect from 148.66.132.190 port 44070:11: Bye Bye [preauth] Jan 13 19:18:15 host sshd[10876]: Disconnected from 148.66.132.190 port 44070 [preauth] Jan 13 19:19:25 host sshd[11114]: Invalid user synopsis from 148.66.132.190 port 38734 Jan 13 19:19:25 host sshd[11114]: input_userauth_request: invalid user synopsis [preauth] Jan 13 19:19:25 host sshd[11114]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:19:25 host sshd[11114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190 Jan 13 19:19:28 host sshd[11114]: Failed password for invalid user synopsis from 148.66.132.190 port 38734 ssh2 Jan 13 19:19:28 host sshd[11114]: Received disconnect from 148.66.132.190 port 38734:11: Bye Bye [preauth] Jan 13 19:19:28 host sshd[11114]: Disconnected from 148.66.132.190 port 38734 [preauth] Jan 13 19:20:38 host sshd[11337]: User root from 91.89.132.76 not allowed because not listed in AllowUsers Jan 13 19:20:38 host sshd[11337]: input_userauth_request: invalid user root [preauth] Jan 13 19:20:38 host unix_chkpwd[11340]: password check failed for user (root) Jan 13 19:20:38 host sshd[11337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.89.132.76 user=root Jan 13 19:20:38 host sshd[11337]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:20:40 host sshd[11337]: Failed password for invalid user root from 91.89.132.76 port 51078 ssh2 Jan 13 19:20:40 host sshd[11337]: Received disconnect from 91.89.132.76 port 51078:11: Bye Bye [preauth] Jan 13 19:20:40 host sshd[11337]: Disconnected from 91.89.132.76 port 51078 [preauth] Jan 13 19:20:40 host sshd[11343]: Invalid user huangmin from 43.134.47.100 port 42906 Jan 13 19:20:40 host sshd[11343]: input_userauth_request: invalid user huangmin [preauth] Jan 13 19:20:40 host sshd[11343]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:20:40 host sshd[11343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.47.100 Jan 13 19:20:41 host sshd[11345]: Invalid user discordm from 122.163.120.143 port 28332 Jan 13 19:20:41 host sshd[11345]: input_userauth_request: invalid user discordm [preauth] Jan 13 19:20:41 host sshd[11345]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:20:41 host sshd[11345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.163.120.143 Jan 13 19:20:42 host sshd[11343]: Failed password for invalid user huangmin from 43.134.47.100 port 42906 ssh2 Jan 13 19:20:42 host sshd[11343]: Received disconnect from 43.134.47.100 port 42906:11: Bye Bye [preauth] Jan 13 19:20:42 host sshd[11343]: Disconnected from 43.134.47.100 port 42906 [preauth] Jan 13 19:20:42 host sshd[11345]: Failed password for invalid user discordm from 122.163.120.143 port 28332 ssh2 Jan 13 19:20:42 host sshd[11345]: Received disconnect from 122.163.120.143 port 28332:11: Bye Bye [preauth] Jan 13 19:20:42 host sshd[11345]: Disconnected from 122.163.120.143 port 28332 [preauth] Jan 13 19:20:51 host sshd[11367]: User root from 80.87.33.100 not allowed because not listed in AllowUsers Jan 13 19:20:51 host sshd[11367]: input_userauth_request: invalid user root [preauth] Jan 13 19:20:51 host unix_chkpwd[11370]: password check failed for user (root) Jan 13 19:20:51 host sshd[11367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.87.33.100 user=root Jan 13 19:20:51 host sshd[11367]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:20:54 host sshd[11367]: Failed password for invalid user root from 80.87.33.100 port 55020 ssh2 Jan 13 19:20:54 host sshd[11367]: Received disconnect from 80.87.33.100 port 55020:11: Bye Bye [preauth] Jan 13 19:20:54 host sshd[11367]: Disconnected from 80.87.33.100 port 55020 [preauth] Jan 13 19:21:03 host sshd[11398]: Invalid user python3 from 43.131.43.132 port 60514 Jan 13 19:21:03 host sshd[11398]: input_userauth_request: invalid user python3 [preauth] Jan 13 19:21:03 host sshd[11398]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:21:03 host sshd[11398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.43.132 Jan 13 19:21:06 host sshd[11398]: Failed password for invalid user python3 from 43.131.43.132 port 60514 ssh2 Jan 13 19:21:06 host sshd[11398]: Received disconnect from 43.131.43.132 port 60514:11: Bye Bye [preauth] Jan 13 19:21:06 host sshd[11398]: Disconnected from 43.131.43.132 port 60514 [preauth] Jan 13 19:21:36 host sshd[11462]: Invalid user admin from 212.83.137.137 port 38908 Jan 13 19:21:36 host sshd[11462]: input_userauth_request: invalid user admin [preauth] Jan 13 19:21:36 host sshd[11462]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:21:36 host sshd[11462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.137.137 Jan 13 19:21:38 host sshd[11462]: Failed password for invalid user admin from 212.83.137.137 port 38908 ssh2 Jan 13 19:21:38 host sshd[11462]: Received disconnect from 212.83.137.137 port 38908:11: Bye Bye [preauth] Jan 13 19:21:38 host sshd[11462]: Disconnected from 212.83.137.137 port 38908 [preauth] Jan 13 19:21:52 host sshd[11486]: Invalid user nexidigital from 159.89.185.234 port 45892 Jan 13 19:21:52 host sshd[11486]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 19:21:52 host sshd[11486]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:21:52 host sshd[11486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 19:21:54 host sshd[11486]: Failed password for invalid user nexidigital from 159.89.185.234 port 45892 ssh2 Jan 13 19:21:55 host sshd[11486]: Connection closed by 159.89.185.234 port 45892 [preauth] Jan 13 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 19:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 19:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=wwwkmaorg user-23=remysagr user-24=disposeat user-25=wwwkapin user-26=woodpeck user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 19:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4U2zyDqKclMr6fWW.~ Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4U2zyDqKclMr6fWW.~' Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4U2zyDqKclMr6fWW.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 19:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 19:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 19:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 19:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 19:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 19:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 19:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 19:23:01 host sshd[11811]: Invalid user hadoop from 201.17.131.43 port 62368 Jan 13 19:23:01 host sshd[11811]: input_userauth_request: invalid user hadoop [preauth] Jan 13 19:23:01 host sshd[11811]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:23:01 host sshd[11811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.131.43 Jan 13 19:23:02 host sshd[11811]: Failed password for invalid user hadoop from 201.17.131.43 port 62368 ssh2 Jan 13 19:23:03 host sshd[11811]: Received disconnect from 201.17.131.43 port 62368:11: Bye Bye [preauth] Jan 13 19:23:03 host sshd[11811]: Disconnected from 201.17.131.43 port 62368 [preauth] Jan 13 19:23:40 host sshd[11887]: Invalid user xerox from 144.22.161.37 port 34132 Jan 13 19:23:40 host sshd[11887]: input_userauth_request: invalid user xerox [preauth] Jan 13 19:23:40 host sshd[11887]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:23:40 host sshd[11887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.161.37 Jan 13 19:23:42 host sshd[11887]: Failed password for invalid user xerox from 144.22.161.37 port 34132 ssh2 Jan 13 19:23:43 host sshd[11887]: Received disconnect from 144.22.161.37 port 34132:11: Bye Bye [preauth] Jan 13 19:23:43 host sshd[11887]: Disconnected from 144.22.161.37 port 34132 [preauth] Jan 13 19:23:56 host sshd[11913]: User root from 186.152.216.101 not allowed because not listed in AllowUsers Jan 13 19:23:56 host sshd[11913]: input_userauth_request: invalid user root [preauth] Jan 13 19:23:56 host unix_chkpwd[11917]: password check failed for user (root) Jan 13 19:23:56 host sshd[11913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.152.216.101 user=root Jan 13 19:23:56 host sshd[11913]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:23:58 host sshd[11913]: Failed password for invalid user root from 186.152.216.101 port 57658 ssh2 Jan 13 19:23:59 host sshd[11913]: Received disconnect from 186.152.216.101 port 57658:11: Bye Bye [preauth] Jan 13 19:23:59 host sshd[11913]: Disconnected from 186.152.216.101 port 57658 [preauth] Jan 13 19:24:15 host sshd[11950]: Invalid user vmware from 46.101.73.246 port 50526 Jan 13 19:24:15 host sshd[11950]: input_userauth_request: invalid user vmware [preauth] Jan 13 19:24:15 host sshd[11950]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:24:15 host sshd[11950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.73.246 Jan 13 19:24:18 host sshd[11950]: Failed password for invalid user vmware from 46.101.73.246 port 50526 ssh2 Jan 13 19:24:18 host sshd[11950]: Received disconnect from 46.101.73.246 port 50526:11: Bye Bye [preauth] Jan 13 19:24:18 host sshd[11950]: Disconnected from 46.101.73.246 port 50526 [preauth] Jan 13 19:25:00 host sshd[12019]: Invalid user sdd from 68.183.56.198 port 40604 Jan 13 19:25:00 host sshd[12019]: input_userauth_request: invalid user sdd [preauth] Jan 13 19:25:00 host sshd[12019]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:25:00 host sshd[12019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.56.198 Jan 13 19:25:02 host sshd[12019]: Failed password for invalid user sdd from 68.183.56.198 port 40604 ssh2 Jan 13 19:25:02 host sshd[12019]: Received disconnect from 68.183.56.198 port 40604:11: Bye Bye [preauth] Jan 13 19:25:02 host sshd[12019]: Disconnected from 68.183.56.198 port 40604 [preauth] Jan 13 19:25:45 host sshd[12219]: User root from 43.131.43.132 not allowed because not listed in AllowUsers Jan 13 19:25:45 host sshd[12219]: input_userauth_request: invalid user root [preauth] Jan 13 19:25:45 host unix_chkpwd[12222]: password check failed for user (root) Jan 13 19:25:45 host sshd[12219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.43.132 user=root Jan 13 19:25:45 host sshd[12219]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:25:47 host sshd[12219]: Failed password for invalid user root from 43.131.43.132 port 53430 ssh2 Jan 13 19:25:47 host sshd[12219]: Received disconnect from 43.131.43.132 port 53430:11: Bye Bye [preauth] Jan 13 19:25:47 host sshd[12219]: Disconnected from 43.131.43.132 port 53430 [preauth] Jan 13 19:26:00 host sshd[12282]: Invalid user jutka from 122.163.120.143 port 24562 Jan 13 19:26:00 host sshd[12282]: input_userauth_request: invalid user jutka [preauth] Jan 13 19:26:00 host sshd[12282]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:26:00 host sshd[12282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.163.120.143 Jan 13 19:26:02 host sshd[12295]: User root from 80.87.33.100 not allowed because not listed in AllowUsers Jan 13 19:26:02 host sshd[12295]: input_userauth_request: invalid user root [preauth] Jan 13 19:26:02 host unix_chkpwd[12300]: password check failed for user (root) Jan 13 19:26:02 host sshd[12295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.87.33.100 user=root Jan 13 19:26:02 host sshd[12295]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:26:03 host sshd[12282]: Failed password for invalid user jutka from 122.163.120.143 port 24562 ssh2 Jan 13 19:26:03 host sshd[12282]: Received disconnect from 122.163.120.143 port 24562:11: Bye Bye [preauth] Jan 13 19:26:03 host sshd[12282]: Disconnected from 122.163.120.143 port 24562 [preauth] Jan 13 19:26:03 host sshd[12298]: Invalid user lxl from 91.89.132.76 port 43474 Jan 13 19:26:03 host sshd[12298]: input_userauth_request: invalid user lxl [preauth] Jan 13 19:26:03 host sshd[12298]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:26:03 host sshd[12298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.89.132.76 Jan 13 19:26:04 host sshd[12295]: Failed password for invalid user root from 80.87.33.100 port 46028 ssh2 Jan 13 19:26:05 host sshd[12298]: Failed password for invalid user lxl from 91.89.132.76 port 43474 ssh2 Jan 13 19:26:05 host sshd[12298]: Received disconnect from 91.89.132.76 port 43474:11: Bye Bye [preauth] Jan 13 19:26:05 host sshd[12298]: Disconnected from 91.89.132.76 port 43474 [preauth] Jan 13 19:26:21 host sshd[12383]: Invalid user Zinan from 43.134.47.100 port 38556 Jan 13 19:26:21 host sshd[12383]: input_userauth_request: invalid user Zinan [preauth] Jan 13 19:26:21 host sshd[12383]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:26:21 host sshd[12383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.47.100 Jan 13 19:26:22 host sshd[12385]: User root from 212.83.137.137 not allowed because not listed in AllowUsers Jan 13 19:26:22 host sshd[12385]: input_userauth_request: invalid user root [preauth] Jan 13 19:26:22 host unix_chkpwd[12388]: password check failed for user (root) Jan 13 19:26:22 host sshd[12385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.137.137 user=root Jan 13 19:26:22 host sshd[12385]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:26:22 host sshd[12383]: Failed password for invalid user Zinan from 43.134.47.100 port 38556 ssh2 Jan 13 19:26:22 host sshd[12383]: Received disconnect from 43.134.47.100 port 38556:11: Bye Bye [preauth] Jan 13 19:26:22 host sshd[12383]: Disconnected from 43.134.47.100 port 38556 [preauth] Jan 13 19:26:23 host sshd[12385]: Failed password for invalid user root from 212.83.137.137 port 59492 ssh2 Jan 13 19:26:23 host sshd[12385]: Received disconnect from 212.83.137.137 port 59492:11: Bye Bye [preauth] Jan 13 19:26:23 host sshd[12385]: Disconnected from 212.83.137.137 port 59492 [preauth] Jan 13 19:26:32 host sshd[12449]: Invalid user fred from 144.22.161.37 port 41894 Jan 13 19:26:32 host sshd[12449]: input_userauth_request: invalid user fred [preauth] Jan 13 19:26:32 host sshd[12449]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:26:32 host sshd[12449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.161.37 Jan 13 19:26:33 host sshd[12449]: Failed password for invalid user fred from 144.22.161.37 port 41894 ssh2 Jan 13 19:26:34 host sshd[12449]: Received disconnect from 144.22.161.37 port 41894:11: Bye Bye [preauth] Jan 13 19:26:34 host sshd[12449]: Disconnected from 144.22.161.37 port 41894 [preauth] Jan 13 19:26:37 host sshd[12458]: Invalid user plum from 46.101.73.246 port 53172 Jan 13 19:26:37 host sshd[12458]: input_userauth_request: invalid user plum [preauth] Jan 13 19:26:37 host sshd[12458]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:26:37 host sshd[12458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.73.246 Jan 13 19:26:39 host sshd[12458]: Failed password for invalid user plum from 46.101.73.246 port 53172 ssh2 Jan 13 19:26:39 host sshd[12458]: Received disconnect from 46.101.73.246 port 53172:11: Bye Bye [preauth] Jan 13 19:26:39 host sshd[12458]: Disconnected from 46.101.73.246 port 53172 [preauth] Jan 13 19:27:14 host sshd[12533]: Invalid user altibase from 68.183.56.198 port 42114 Jan 13 19:27:14 host sshd[12533]: input_userauth_request: invalid user altibase [preauth] Jan 13 19:27:14 host sshd[12533]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:27:14 host sshd[12533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.56.198 Jan 13 19:27:16 host sshd[12533]: Failed password for invalid user altibase from 68.183.56.198 port 42114 ssh2 Jan 13 19:27:17 host sshd[12533]: Received disconnect from 68.183.56.198 port 42114:11: Bye Bye [preauth] Jan 13 19:27:17 host sshd[12533]: Disconnected from 68.183.56.198 port 42114 [preauth] Jan 13 19:27:25 host sshd[12550]: Invalid user huangmin from 122.163.120.143 port 51022 Jan 13 19:27:25 host sshd[12550]: input_userauth_request: invalid user huangmin [preauth] Jan 13 19:27:25 host sshd[12550]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:27:25 host sshd[12550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.163.120.143 Jan 13 19:27:27 host sshd[12550]: Failed password for invalid user huangmin from 122.163.120.143 port 51022 ssh2 Jan 13 19:27:27 host sshd[12550]: Received disconnect from 122.163.120.143 port 51022:11: Bye Bye [preauth] Jan 13 19:27:27 host sshd[12550]: Disconnected from 122.163.120.143 port 51022 [preauth] Jan 13 19:27:32 host sshd[12621]: User root from 43.134.47.100 not allowed because not listed in AllowUsers Jan 13 19:27:32 host sshd[12621]: input_userauth_request: invalid user root [preauth] Jan 13 19:27:32 host unix_chkpwd[12624]: password check failed for user (root) Jan 13 19:27:32 host sshd[12621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.47.100 user=root Jan 13 19:27:32 host sshd[12621]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:27:34 host sshd[12621]: Failed password for invalid user root from 43.134.47.100 port 32958 ssh2 Jan 13 19:27:36 host sshd[12662]: Invalid user jyxu from 46.101.73.246 port 47680 Jan 13 19:27:36 host sshd[12662]: input_userauth_request: invalid user jyxu [preauth] Jan 13 19:27:36 host sshd[12662]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:27:36 host sshd[12662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.73.246 Jan 13 19:27:38 host sshd[12662]: Failed password for invalid user jyxu from 46.101.73.246 port 47680 ssh2 Jan 13 19:27:39 host sshd[12667]: Invalid user sbzmpp from 201.17.131.43 port 2662 Jan 13 19:27:39 host sshd[12667]: input_userauth_request: invalid user sbzmpp [preauth] Jan 13 19:27:39 host sshd[12667]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:27:39 host sshd[12667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.131.43 Jan 13 19:27:39 host sshd[12662]: Received disconnect from 46.101.73.246 port 47680:11: Bye Bye [preauth] Jan 13 19:27:39 host sshd[12662]: Disconnected from 46.101.73.246 port 47680 [preauth] Jan 13 19:27:40 host sshd[12667]: Failed password for invalid user sbzmpp from 201.17.131.43 port 2662 ssh2 Jan 13 19:27:40 host sshd[12667]: Received disconnect from 201.17.131.43 port 2662:11: Bye Bye [preauth] Jan 13 19:27:40 host sshd[12667]: Disconnected from 201.17.131.43 port 2662 [preauth] Jan 13 19:27:50 host sshd[12735]: Invalid user discordm from 186.152.216.101 port 39172 Jan 13 19:27:50 host sshd[12735]: input_userauth_request: invalid user discordm [preauth] Jan 13 19:27:50 host sshd[12735]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:27:50 host sshd[12735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.152.216.101 Jan 13 19:27:53 host sshd[12735]: Failed password for invalid user discordm from 186.152.216.101 port 39172 ssh2 Jan 13 19:27:53 host sshd[12735]: Received disconnect from 186.152.216.101 port 39172:11: Bye Bye [preauth] Jan 13 19:27:53 host sshd[12735]: Disconnected from 186.152.216.101 port 39172 [preauth] Jan 13 19:27:56 host sshd[12785]: Invalid user zhangyuekai from 144.22.161.37 port 33682 Jan 13 19:27:56 host sshd[12785]: input_userauth_request: invalid user zhangyuekai [preauth] Jan 13 19:27:56 host sshd[12785]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:27:56 host sshd[12785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.161.37 Jan 13 19:27:58 host sshd[12785]: Failed password for invalid user zhangyuekai from 144.22.161.37 port 33682 ssh2 Jan 13 19:28:18 host sshd[12884]: Invalid user djx from 68.183.56.198 port 40910 Jan 13 19:28:18 host sshd[12884]: input_userauth_request: invalid user djx [preauth] Jan 13 19:28:18 host sshd[12884]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:28:18 host sshd[12884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.56.198 Jan 13 19:28:20 host sshd[12884]: Failed password for invalid user djx from 68.183.56.198 port 40910 ssh2 Jan 13 19:28:20 host sshd[12884]: Received disconnect from 68.183.56.198 port 40910:11: Bye Bye [preauth] Jan 13 19:28:20 host sshd[12884]: Disconnected from 68.183.56.198 port 40910 [preauth] Jan 13 19:28:36 host sshd[12987]: Invalid user guest from 160.251.22.105 port 41756 Jan 13 19:28:36 host sshd[12987]: input_userauth_request: invalid user guest [preauth] Jan 13 19:28:36 host sshd[12987]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:28:36 host sshd[12987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.251.22.105 Jan 13 19:28:38 host sshd[12987]: Failed password for invalid user guest from 160.251.22.105 port 41756 ssh2 Jan 13 19:28:38 host sshd[12987]: Received disconnect from 160.251.22.105 port 41756:11: Bye Bye [preauth] Jan 13 19:28:38 host sshd[12987]: Disconnected from 160.251.22.105 port 41756 [preauth] Jan 13 19:29:16 host sshd[13111]: Connection reset by 59.27.224.94 port 60279 [preauth] Jan 13 19:29:33 host sshd[13173]: Invalid user sdd from 201.17.131.43 port 58381 Jan 13 19:29:33 host sshd[13173]: input_userauth_request: invalid user sdd [preauth] Jan 13 19:29:33 host sshd[13173]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:29:33 host sshd[13173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.131.43 Jan 13 19:29:35 host sshd[13173]: Failed password for invalid user sdd from 201.17.131.43 port 58381 ssh2 Jan 13 19:29:35 host sshd[13173]: Received disconnect from 201.17.131.43 port 58381:11: Bye Bye [preauth] Jan 13 19:29:35 host sshd[13173]: Disconnected from 201.17.131.43 port 58381 [preauth] Jan 13 19:29:43 host sshd[13243]: User root from 160.251.22.105 not allowed because not listed in AllowUsers Jan 13 19:29:43 host sshd[13243]: input_userauth_request: invalid user root [preauth] Jan 13 19:29:44 host unix_chkpwd[13245]: password check failed for user (root) Jan 13 19:29:44 host sshd[13243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.251.22.105 user=root Jan 13 19:29:44 host sshd[13243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:29:45 host sshd[13243]: Failed password for invalid user root from 160.251.22.105 port 50134 ssh2 Jan 13 19:29:46 host sshd[13243]: Received disconnect from 160.251.22.105 port 50134:11: Bye Bye [preauth] Jan 13 19:29:46 host sshd[13243]: Disconnected from 160.251.22.105 port 50134 [preauth] Jan 13 19:33:38 host sshd[14130]: Connection reset by 114.33.27.150 port 52499 [preauth] Jan 13 19:36:49 host sshd[14853]: Connection reset by 125.134.168.105 port 61419 [preauth] Jan 13 19:38:29 host sshd[15189]: Invalid user do from 194.110.203.109 port 57176 Jan 13 19:38:29 host sshd[15189]: input_userauth_request: invalid user do [preauth] Jan 13 19:38:29 host sshd[15189]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:38:29 host sshd[15189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 19:38:32 host sshd[15189]: Failed password for invalid user do from 194.110.203.109 port 57176 ssh2 Jan 13 19:38:35 host sshd[15189]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:38:37 host sshd[15189]: Failed password for invalid user do from 194.110.203.109 port 57176 ssh2 Jan 13 19:38:40 host sshd[15220]: User root from 211.220.47.138 not allowed because not listed in AllowUsers Jan 13 19:38:40 host sshd[15220]: input_userauth_request: invalid user root [preauth] Jan 13 19:38:40 host unix_chkpwd[15224]: password check failed for user (root) Jan 13 19:38:40 host sshd[15220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.47.138 user=root Jan 13 19:38:40 host sshd[15220]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:38:40 host sshd[15189]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:38:42 host sshd[15220]: Failed password for invalid user root from 211.220.47.138 port 60802 ssh2 Jan 13 19:38:42 host sshd[15220]: Received disconnect from 211.220.47.138 port 60802:11: Bye Bye [preauth] Jan 13 19:38:42 host sshd[15220]: Disconnected from 211.220.47.138 port 60802 [preauth] Jan 13 19:38:42 host sshd[15189]: Failed password for invalid user do from 194.110.203.109 port 57176 ssh2 Jan 13 19:38:46 host sshd[15189]: Connection closed by 194.110.203.109 port 57176 [preauth] Jan 13 19:38:46 host sshd[15189]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 19:40:39 host sshd[15555]: Invalid user nginx from 203.251.108.178 port 57889 Jan 13 19:40:39 host sshd[15555]: input_userauth_request: invalid user nginx [preauth] Jan 13 19:40:39 host sshd[15555]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:40:39 host sshd[15555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.251.108.178 Jan 13 19:40:41 host sshd[15555]: Failed password for invalid user nginx from 203.251.108.178 port 57889 ssh2 Jan 13 19:40:43 host sshd[15555]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:40:44 host sshd[15565]: User root from 202.29.13.52 not allowed because not listed in AllowUsers Jan 13 19:40:44 host sshd[15565]: input_userauth_request: invalid user root [preauth] Jan 13 19:40:44 host unix_chkpwd[15568]: password check failed for user (root) Jan 13 19:40:44 host sshd[15565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.13.52 user=root Jan 13 19:40:44 host sshd[15565]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:40:45 host sshd[15555]: Failed password for invalid user nginx from 203.251.108.178 port 57889 ssh2 Jan 13 19:40:46 host sshd[15555]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:40:46 host sshd[15565]: Failed password for invalid user root from 202.29.13.52 port 46870 ssh2 Jan 13 19:40:47 host sshd[15565]: Received disconnect from 202.29.13.52 port 46870:11: Bye Bye [preauth] Jan 13 19:40:47 host sshd[15565]: Disconnected from 202.29.13.52 port 46870 [preauth] Jan 13 19:40:48 host sshd[15555]: Failed password for invalid user nginx from 203.251.108.178 port 57889 ssh2 Jan 13 19:40:49 host sshd[15555]: Failed password for invalid user nginx from 203.251.108.178 port 57889 ssh2 Jan 13 19:40:49 host sshd[15555]: Connection reset by 203.251.108.178 port 57889 [preauth] Jan 13 19:40:49 host sshd[15555]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.251.108.178 Jan 13 19:42:40 host sshd[15900]: Invalid user w from 192.227.164.69 port 55182 Jan 13 19:42:40 host sshd[15900]: input_userauth_request: invalid user w [preauth] Jan 13 19:42:40 host sshd[15900]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:42:40 host sshd[15900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.164.69 Jan 13 19:42:42 host sshd[15900]: Failed password for invalid user w from 192.227.164.69 port 55182 ssh2 Jan 13 19:42:42 host sshd[15900]: Received disconnect from 192.227.164.69 port 55182:11: Bye Bye [preauth] Jan 13 19:42:42 host sshd[15900]: Disconnected from 192.227.164.69 port 55182 [preauth] Jan 13 19:43:08 host sshd[15955]: User root from 176.96.186.130 not allowed because not listed in AllowUsers Jan 13 19:43:08 host sshd[15955]: input_userauth_request: invalid user root [preauth] Jan 13 19:43:08 host unix_chkpwd[15958]: password check failed for user (root) Jan 13 19:43:08 host sshd[15955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.96.186.130 user=root Jan 13 19:43:08 host sshd[15955]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:43:10 host sshd[15955]: Failed password for invalid user root from 176.96.186.130 port 35178 ssh2 Jan 13 19:43:10 host sshd[15955]: Received disconnect from 176.96.186.130 port 35178:11: Bye Bye [preauth] Jan 13 19:43:10 host sshd[15955]: Disconnected from 176.96.186.130 port 35178 [preauth] Jan 13 19:43:28 host sshd[15976]: Invalid user aztech from 20.194.60.135 port 42116 Jan 13 19:43:28 host sshd[15976]: input_userauth_request: invalid user aztech [preauth] Jan 13 19:43:28 host sshd[15976]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:43:28 host sshd[15976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.194.60.135 Jan 13 19:43:30 host sshd[15976]: Failed password for invalid user aztech from 20.194.60.135 port 42116 ssh2 Jan 13 19:43:30 host sshd[15976]: Received disconnect from 20.194.60.135 port 42116:11: Bye Bye [preauth] Jan 13 19:43:30 host sshd[15976]: Disconnected from 20.194.60.135 port 42116 [preauth] Jan 13 19:44:04 host sshd[16052]: Invalid user veewee from 202.29.13.52 port 44738 Jan 13 19:44:04 host sshd[16052]: input_userauth_request: invalid user veewee [preauth] Jan 13 19:44:04 host sshd[16052]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:44:04 host sshd[16052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.13.52 Jan 13 19:44:06 host sshd[16052]: Failed password for invalid user veewee from 202.29.13.52 port 44738 ssh2 Jan 13 19:44:06 host sshd[16052]: Received disconnect from 202.29.13.52 port 44738:11: Bye Bye [preauth] Jan 13 19:44:06 host sshd[16052]: Disconnected from 202.29.13.52 port 44738 [preauth] Jan 13 19:44:18 host sshd[16103]: User root from 211.220.47.138 not allowed because not listed in AllowUsers Jan 13 19:44:18 host sshd[16103]: input_userauth_request: invalid user root [preauth] Jan 13 19:44:18 host unix_chkpwd[16107]: password check failed for user (root) Jan 13 19:44:18 host sshd[16103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.47.138 user=root Jan 13 19:44:18 host sshd[16103]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:44:20 host sshd[16103]: Failed password for invalid user root from 211.220.47.138 port 58452 ssh2 Jan 13 19:44:20 host sshd[16103]: Received disconnect from 211.220.47.138 port 58452:11: Bye Bye [preauth] Jan 13 19:44:20 host sshd[16103]: Disconnected from 211.220.47.138 port 58452 [preauth] Jan 13 19:44:30 host sshd[16225]: User root from 52.142.11.171 not allowed because not listed in AllowUsers Jan 13 19:44:30 host sshd[16225]: input_userauth_request: invalid user root [preauth] Jan 13 19:44:30 host unix_chkpwd[16230]: password check failed for user (root) Jan 13 19:44:30 host sshd[16225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.142.11.171 user=root Jan 13 19:44:30 host sshd[16225]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:44:32 host sshd[16225]: Failed password for invalid user root from 52.142.11.171 port 1024 ssh2 Jan 13 19:44:32 host sshd[16225]: Received disconnect from 52.142.11.171 port 1024:11: Bye Bye [preauth] Jan 13 19:44:32 host sshd[16225]: Disconnected from 52.142.11.171 port 1024 [preauth] Jan 13 19:47:13 host sshd[16792]: Invalid user cl from 43.154.47.162 port 52466 Jan 13 19:47:13 host sshd[16792]: input_userauth_request: invalid user cl [preauth] Jan 13 19:47:13 host sshd[16792]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:47:13 host sshd[16792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.47.162 Jan 13 19:47:15 host sshd[16792]: Failed password for invalid user cl from 43.154.47.162 port 52466 ssh2 Jan 13 19:47:15 host sshd[16792]: Received disconnect from 43.154.47.162 port 52466:11: Bye Bye [preauth] Jan 13 19:47:15 host sshd[16792]: Disconnected from 43.154.47.162 port 52466 [preauth] Jan 13 19:48:12 host sshd[17027]: Invalid user admin from 118.44.148.45 port 63403 Jan 13 19:48:12 host sshd[17027]: input_userauth_request: invalid user admin [preauth] Jan 13 19:48:12 host sshd[17027]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:48:12 host sshd[17027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.44.148.45 Jan 13 19:48:14 host sshd[17027]: Failed password for invalid user admin from 118.44.148.45 port 63403 ssh2 Jan 13 19:48:14 host sshd[17027]: Failed password for invalid user admin from 118.44.148.45 port 63403 ssh2 Jan 13 19:48:15 host sshd[17027]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:48:17 host sshd[17027]: Failed password for invalid user admin from 118.44.148.45 port 63403 ssh2 Jan 13 19:48:17 host sshd[17040]: Invalid user dongxuewei from 192.227.164.69 port 42500 Jan 13 19:48:17 host sshd[17040]: input_userauth_request: invalid user dongxuewei [preauth] Jan 13 19:48:17 host sshd[17040]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:48:17 host sshd[17040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.164.69 Jan 13 19:48:18 host sshd[17027]: Connection reset by 118.44.148.45 port 63403 [preauth] Jan 13 19:48:18 host sshd[17027]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.44.148.45 Jan 13 19:48:20 host sshd[17040]: Failed password for invalid user dongxuewei from 192.227.164.69 port 42500 ssh2 Jan 13 19:48:20 host sshd[17040]: Received disconnect from 192.227.164.69 port 42500:11: Bye Bye [preauth] Jan 13 19:48:20 host sshd[17040]: Disconnected from 192.227.164.69 port 42500 [preauth] Jan 13 19:48:34 host sshd[17089]: User root from 52.142.11.171 not allowed because not listed in AllowUsers Jan 13 19:48:34 host sshd[17089]: input_userauth_request: invalid user root [preauth] Jan 13 19:48:34 host unix_chkpwd[17093]: password check failed for user (root) Jan 13 19:48:34 host sshd[17089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.142.11.171 user=root Jan 13 19:48:34 host sshd[17089]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:48:36 host sshd[17089]: Failed password for invalid user root from 52.142.11.171 port 1024 ssh2 Jan 13 19:48:36 host sshd[17089]: Received disconnect from 52.142.11.171 port 1024:11: Bye Bye [preauth] Jan 13 19:48:36 host sshd[17089]: Disconnected from 52.142.11.171 port 1024 [preauth] Jan 13 19:48:42 host sshd[17137]: User root from 180.221.195.238 not allowed because not listed in AllowUsers Jan 13 19:48:42 host sshd[17137]: input_userauth_request: invalid user root [preauth] Jan 13 19:48:42 host unix_chkpwd[17140]: password check failed for user (root) Jan 13 19:48:42 host sshd[17137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.221.195.238 user=root Jan 13 19:48:42 host sshd[17137]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:48:45 host sshd[17137]: Failed password for invalid user root from 180.221.195.238 port 62816 ssh2 Jan 13 19:48:45 host unix_chkpwd[17143]: password check failed for user (root) Jan 13 19:48:45 host sshd[17137]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:48:47 host sshd[17137]: Failed password for invalid user root from 180.221.195.238 port 62816 ssh2 Jan 13 19:48:48 host unix_chkpwd[17146]: password check failed for user (root) Jan 13 19:48:48 host sshd[17137]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:48:50 host sshd[17137]: Failed password for invalid user root from 180.221.195.238 port 62816 ssh2 Jan 13 19:48:50 host sshd[17137]: Connection reset by 180.221.195.238 port 62816 [preauth] Jan 13 19:48:50 host sshd[17137]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.221.195.238 user=root Jan 13 19:48:56 host sshd[17191]: Invalid user yindong from 176.96.186.130 port 36872 Jan 13 19:48:56 host sshd[17191]: input_userauth_request: invalid user yindong [preauth] Jan 13 19:48:56 host sshd[17191]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:48:56 host sshd[17191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.96.186.130 Jan 13 19:48:58 host sshd[17191]: Failed password for invalid user yindong from 176.96.186.130 port 36872 ssh2 Jan 13 19:48:59 host sshd[17191]: Received disconnect from 176.96.186.130 port 36872:11: Bye Bye [preauth] Jan 13 19:48:59 host sshd[17191]: Disconnected from 176.96.186.130 port 36872 [preauth] Jan 13 19:49:10 host sshd[17247]: Invalid user koala from 20.194.60.135 port 37496 Jan 13 19:49:10 host sshd[17247]: input_userauth_request: invalid user koala [preauth] Jan 13 19:49:10 host sshd[17247]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:49:10 host sshd[17247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.194.60.135 Jan 13 19:49:12 host sshd[17247]: Failed password for invalid user koala from 20.194.60.135 port 37496 ssh2 Jan 13 19:49:12 host sshd[17247]: Received disconnect from 20.194.60.135 port 37496:11: Bye Bye [preauth] Jan 13 19:49:12 host sshd[17247]: Disconnected from 20.194.60.135 port 37496 [preauth] Jan 13 19:49:22 host sshd[17260]: Invalid user sslvpn from 192.227.164.69 port 40358 Jan 13 19:49:22 host sshd[17260]: input_userauth_request: invalid user sslvpn [preauth] Jan 13 19:49:22 host sshd[17260]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:49:22 host sshd[17260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.164.69 Jan 13 19:49:24 host sshd[17260]: Failed password for invalid user sslvpn from 192.227.164.69 port 40358 ssh2 Jan 13 19:50:23 host sshd[17417]: Invalid user dell from 20.194.60.135 port 60256 Jan 13 19:50:23 host sshd[17417]: input_userauth_request: invalid user dell [preauth] Jan 13 19:50:23 host sshd[17417]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:50:23 host sshd[17417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.194.60.135 Jan 13 19:50:24 host sshd[17417]: Failed password for invalid user dell from 20.194.60.135 port 60256 ssh2 Jan 13 19:51:22 host sshd[17675]: Invalid user mk from 43.154.47.162 port 33102 Jan 13 19:51:22 host sshd[17675]: input_userauth_request: invalid user mk [preauth] Jan 13 19:51:22 host sshd[17675]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:51:22 host sshd[17675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.47.162 Jan 13 19:51:24 host sshd[17675]: Failed password for invalid user mk from 43.154.47.162 port 33102 ssh2 Jan 13 19:51:24 host sshd[17675]: Received disconnect from 43.154.47.162 port 33102:11: Bye Bye [preauth] Jan 13 19:51:24 host sshd[17675]: Disconnected from 43.154.47.162 port 33102 [preauth] Jan 13 19:52:48 host sshd[17832]: Invalid user wasadmin from 43.154.47.162 port 56288 Jan 13 19:52:48 host sshd[17832]: input_userauth_request: invalid user wasadmin [preauth] Jan 13 19:52:48 host sshd[17832]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:52:48 host sshd[17832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.47.162 Jan 13 19:52:50 host sshd[17832]: Failed password for invalid user wasadmin from 43.154.47.162 port 56288 ssh2 Jan 13 19:53:05 host sshd[17913]: Connection reset by 222.98.222.118 port 61491 [preauth] Jan 13 19:55:21 host sshd[18148]: User root from 59.25.69.29 not allowed because not listed in AllowUsers Jan 13 19:55:21 host sshd[18148]: input_userauth_request: invalid user root [preauth] Jan 13 19:55:21 host unix_chkpwd[18156]: password check failed for user (root) Jan 13 19:55:21 host sshd[18148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.69.29 user=root Jan 13 19:55:21 host sshd[18148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:55:23 host sshd[18148]: Failed password for invalid user root from 59.25.69.29 port 60556 ssh2 Jan 13 19:55:24 host unix_chkpwd[18161]: password check failed for user (root) Jan 13 19:55:24 host sshd[18148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:55:26 host sshd[18148]: Failed password for invalid user root from 59.25.69.29 port 60556 ssh2 Jan 13 19:55:27 host unix_chkpwd[18164]: password check failed for user (root) Jan 13 19:55:27 host sshd[18148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:55:29 host sshd[18148]: Failed password for invalid user root from 59.25.69.29 port 60556 ssh2 Jan 13 19:55:30 host unix_chkpwd[18190]: password check failed for user (root) Jan 13 19:55:30 host sshd[18148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:55:32 host sshd[18148]: Failed password for invalid user root from 59.25.69.29 port 60556 ssh2 Jan 13 19:55:33 host unix_chkpwd[18193]: password check failed for user (root) Jan 13 19:55:33 host sshd[18148]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 19:55:36 host sshd[18148]: Failed password for invalid user root from 59.25.69.29 port 60556 ssh2 Jan 13 19:59:18 host sshd[18712]: Invalid user vadmin from 98.193.140.172 port 62580 Jan 13 19:59:18 host sshd[18712]: input_userauth_request: invalid user vadmin [preauth] Jan 13 19:59:18 host sshd[18712]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:59:18 host sshd[18712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.193.140.172 Jan 13 19:59:19 host sshd[18712]: Failed password for invalid user vadmin from 98.193.140.172 port 62580 ssh2 Jan 13 19:59:23 host sshd[18712]: pam_unix(sshd:auth): check pass; user unknown Jan 13 19:59:24 host sshd[18712]: Failed password for invalid user vadmin from 98.193.140.172 port 62580 ssh2 Jan 13 19:59:28 host sshd[18712]: Connection reset by 98.193.140.172 port 62580 [preauth] Jan 13 19:59:28 host sshd[18712]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.193.140.172 Jan 13 20:01:09 host sshd[18952]: Invalid user Admin from 99.113.193.2 port 41854 Jan 13 20:01:09 host sshd[18952]: input_userauth_request: invalid user Admin [preauth] Jan 13 20:01:09 host sshd[18952]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:01:09 host sshd[18952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.113.193.2 Jan 13 20:01:11 host sshd[18952]: Failed password for invalid user Admin from 99.113.193.2 port 41854 ssh2 Jan 13 20:01:11 host sshd[18952]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:01:13 host sshd[18952]: Failed password for invalid user Admin from 99.113.193.2 port 41854 ssh2 Jan 13 20:01:14 host sshd[18952]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:01:16 host sshd[18952]: Failed password for invalid user Admin from 99.113.193.2 port 41854 ssh2 Jan 13 20:01:17 host sshd[18952]: Connection reset by 99.113.193.2 port 41854 [preauth] Jan 13 20:01:17 host sshd[18952]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.113.193.2 Jan 13 20:04:11 host sshd[19382]: Invalid user super from 220.135.164.239 port 58568 Jan 13 20:04:11 host sshd[19382]: input_userauth_request: invalid user super [preauth] Jan 13 20:04:11 host sshd[19382]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:04:11 host sshd[19382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.164.239 Jan 13 20:04:13 host sshd[19382]: Failed password for invalid user super from 220.135.164.239 port 58568 ssh2 Jan 13 20:04:13 host sshd[19382]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:04:16 host sshd[19382]: Failed password for invalid user super from 220.135.164.239 port 58568 ssh2 Jan 13 20:04:16 host sshd[19382]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:04:18 host sshd[19382]: Failed password for invalid user super from 220.135.164.239 port 58568 ssh2 Jan 13 20:04:19 host sshd[19382]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:04:20 host sshd[19382]: Failed password for invalid user super from 220.135.164.239 port 58568 ssh2 Jan 13 20:04:22 host sshd[19382]: Failed password for invalid user super from 220.135.164.239 port 58568 ssh2 Jan 13 20:04:23 host sshd[19382]: Connection closed by 220.135.164.239 port 58568 [preauth] Jan 13 20:04:23 host sshd[19382]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.164.239 Jan 13 20:04:23 host sshd[19382]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 13 20:07:23 host sshd[19887]: Invalid user postgres from 118.32.217.238 port 61148 Jan 13 20:07:23 host sshd[19887]: input_userauth_request: invalid user postgres [preauth] Jan 13 20:07:23 host sshd[19887]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:07:23 host sshd[19887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.217.238 Jan 13 20:07:25 host sshd[19887]: Failed password for invalid user postgres from 118.32.217.238 port 61148 ssh2 Jan 13 20:07:26 host sshd[19887]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:07:28 host sshd[19887]: Failed password for invalid user postgres from 118.32.217.238 port 61148 ssh2 Jan 13 20:07:29 host sshd[19887]: Connection reset by 118.32.217.238 port 61148 [preauth] Jan 13 20:07:29 host sshd[19887]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.217.238 Jan 13 20:08:48 host sshd[20074]: Invalid user hadoop from 71.25.118.117 port 48784 Jan 13 20:08:48 host sshd[20074]: input_userauth_request: invalid user hadoop [preauth] Jan 13 20:08:48 host sshd[20074]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:08:48 host sshd[20074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.25.118.117 Jan 13 20:08:50 host sshd[20074]: Failed password for invalid user hadoop from 71.25.118.117 port 48784 ssh2 Jan 13 20:08:50 host sshd[20074]: Received disconnect from 71.25.118.117 port 48784:11: Bye Bye [preauth] Jan 13 20:08:50 host sshd[20074]: Disconnected from 71.25.118.117 port 48784 [preauth] Jan 13 20:09:04 host sshd[20128]: User root from 114.33.110.195 not allowed because not listed in AllowUsers Jan 13 20:09:04 host sshd[20128]: input_userauth_request: invalid user root [preauth] Jan 13 20:09:04 host unix_chkpwd[20131]: password check failed for user (root) Jan 13 20:09:04 host sshd[20128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.110.195 user=root Jan 13 20:09:04 host sshd[20128]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:09:06 host sshd[20128]: Failed password for invalid user root from 114.33.110.195 port 45468 ssh2 Jan 13 20:09:07 host unix_chkpwd[20137]: password check failed for user (root) Jan 13 20:09:07 host sshd[20128]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:09:09 host sshd[20128]: Failed password for invalid user root from 114.33.110.195 port 45468 ssh2 Jan 13 20:09:10 host unix_chkpwd[20140]: password check failed for user (root) Jan 13 20:09:10 host sshd[20128]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:09:12 host sshd[20128]: Failed password for invalid user root from 114.33.110.195 port 45468 ssh2 Jan 13 20:09:13 host unix_chkpwd[20144]: password check failed for user (root) Jan 13 20:09:13 host sshd[20128]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:09:15 host sshd[20128]: Failed password for invalid user root from 114.33.110.195 port 45468 ssh2 Jan 13 20:10:14 host sshd[20285]: User root from 185.137.27.170 not allowed because not listed in AllowUsers Jan 13 20:10:14 host sshd[20285]: input_userauth_request: invalid user root [preauth] Jan 13 20:10:14 host unix_chkpwd[20291]: password check failed for user (root) Jan 13 20:10:14 host sshd[20285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.170 user=root Jan 13 20:10:14 host sshd[20285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:10:15 host sshd[20285]: Failed password for invalid user root from 185.137.27.170 port 55080 ssh2 Jan 13 20:10:16 host sshd[20285]: Received disconnect from 185.137.27.170 port 55080:11: Bye Bye [preauth] Jan 13 20:10:16 host sshd[20285]: Disconnected from 185.137.27.170 port 55080 [preauth] Jan 13 20:10:40 host sshd[20341]: Invalid user lsfadmin from 51.210.149.157 port 40362 Jan 13 20:10:40 host sshd[20341]: input_userauth_request: invalid user lsfadmin [preauth] Jan 13 20:10:40 host sshd[20341]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:10:40 host sshd[20341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.149.157 Jan 13 20:10:43 host sshd[20341]: Failed password for invalid user lsfadmin from 51.210.149.157 port 40362 ssh2 Jan 13 20:10:43 host sshd[20341]: Received disconnect from 51.210.149.157 port 40362:11: Bye Bye [preauth] Jan 13 20:10:43 host sshd[20341]: Disconnected from 51.210.149.157 port 40362 [preauth] Jan 13 20:11:35 host sshd[20448]: Invalid user gwy from 107.189.29.149 port 58118 Jan 13 20:11:35 host sshd[20448]: input_userauth_request: invalid user gwy [preauth] Jan 13 20:11:35 host sshd[20448]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:11:35 host sshd[20448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.29.149 Jan 13 20:11:37 host sshd[20448]: Failed password for invalid user gwy from 107.189.29.149 port 58118 ssh2 Jan 13 20:11:37 host sshd[20448]: Received disconnect from 107.189.29.149 port 58118:11: Bye Bye [preauth] Jan 13 20:11:37 host sshd[20448]: Disconnected from 107.189.29.149 port 58118 [preauth] Jan 13 20:12:38 host sshd[20544]: User root from 45.133.239.165 not allowed because not listed in AllowUsers Jan 13 20:12:38 host sshd[20544]: input_userauth_request: invalid user root [preauth] Jan 13 20:12:38 host unix_chkpwd[20547]: password check failed for user (root) Jan 13 20:12:38 host sshd[20544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.133.239.165 user=root Jan 13 20:12:38 host sshd[20544]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:12:40 host sshd[20544]: Failed password for invalid user root from 45.133.239.165 port 58282 ssh2 Jan 13 20:12:40 host sshd[20544]: Received disconnect from 45.133.239.165 port 58282:11: Bye Bye [preauth] Jan 13 20:12:40 host sshd[20544]: Disconnected from 45.133.239.165 port 58282 [preauth] Jan 13 20:13:02 host sshd[20572]: Invalid user songxue from 186.13.39.199 port 50322 Jan 13 20:13:02 host sshd[20572]: input_userauth_request: invalid user songxue [preauth] Jan 13 20:13:02 host sshd[20572]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:13:02 host sshd[20572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.13.39.199 Jan 13 20:13:03 host sshd[20572]: Failed password for invalid user songxue from 186.13.39.199 port 50322 ssh2 Jan 13 20:13:04 host sshd[20572]: Received disconnect from 186.13.39.199 port 50322:11: Bye Bye [preauth] Jan 13 20:13:04 host sshd[20572]: Disconnected from 186.13.39.199 port 50322 [preauth] Jan 13 20:14:03 host sshd[20811]: User root from 45.225.160.66 not allowed because not listed in AllowUsers Jan 13 20:14:03 host sshd[20811]: input_userauth_request: invalid user root [preauth] Jan 13 20:14:03 host unix_chkpwd[20814]: password check failed for user (root) Jan 13 20:14:03 host sshd[20811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.66 user=root Jan 13 20:14:03 host sshd[20811]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:14:05 host sshd[20811]: Failed password for invalid user root from 45.225.160.66 port 55584 ssh2 Jan 13 20:14:06 host sshd[20811]: Received disconnect from 45.225.160.66 port 55584:11: Bye Bye [preauth] Jan 13 20:14:06 host sshd[20811]: Disconnected from 45.225.160.66 port 55584 [preauth] Jan 13 20:14:13 host sshd[20825]: User root from 71.25.118.117 not allowed because not listed in AllowUsers Jan 13 20:14:13 host sshd[20825]: input_userauth_request: invalid user root [preauth] Jan 13 20:14:13 host unix_chkpwd[20828]: password check failed for user (root) Jan 13 20:14:13 host sshd[20825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.25.118.117 user=root Jan 13 20:14:13 host sshd[20825]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:14:15 host sshd[20825]: Failed password for invalid user root from 71.25.118.117 port 49198 ssh2 Jan 13 20:14:15 host sshd[20825]: Received disconnect from 71.25.118.117 port 49198:11: Bye Bye [preauth] Jan 13 20:14:15 host sshd[20825]: Disconnected from 71.25.118.117 port 49198 [preauth] Jan 13 20:14:28 host sshd[20881]: Did not receive identification string from 194.163.142.251 port 38564 Jan 13 20:14:30 host sshd[20906]: Invalid user ubuntu from 194.163.142.251 port 43236 Jan 13 20:14:30 host sshd[20906]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 20:14:30 host sshd[20909]: User root from 194.163.142.251 not allowed because not listed in AllowUsers Jan 13 20:14:30 host sshd[20909]: input_userauth_request: invalid user root [preauth] Jan 13 20:14:30 host sshd[20905]: User root from 194.163.142.251 not allowed because not listed in AllowUsers Jan 13 20:14:30 host sshd[20905]: input_userauth_request: invalid user root [preauth] Jan 13 20:14:30 host sshd[20910]: User root from 194.163.142.251 not allowed because not listed in AllowUsers Jan 13 20:14:30 host sshd[20910]: input_userauth_request: invalid user root [preauth] Jan 13 20:14:30 host sshd[20914]: Invalid user test from 194.163.142.251 port 43136 Jan 13 20:14:30 host sshd[20912]: Invalid user user from 194.163.142.251 port 43218 Jan 13 20:14:30 host sshd[20914]: input_userauth_request: invalid user test [preauth] Jan 13 20:14:30 host sshd[20912]: input_userauth_request: invalid user user [preauth] Jan 13 20:14:30 host sshd[20915]: Invalid user test from 194.163.142.251 port 43220 Jan 13 20:14:30 host sshd[20915]: input_userauth_request: invalid user test [preauth] Jan 13 20:14:30 host sshd[20913]: Invalid user admin from 194.163.142.251 port 43234 Jan 13 20:14:30 host sshd[20913]: input_userauth_request: invalid user admin [preauth] Jan 13 20:14:30 host sshd[20916]: User root from 194.163.142.251 not allowed because not listed in AllowUsers Jan 13 20:14:30 host sshd[20916]: input_userauth_request: invalid user root [preauth] Jan 13 20:14:30 host sshd[20923]: Invalid user admin from 194.163.142.251 port 43152 Jan 13 20:14:30 host sshd[20923]: input_userauth_request: invalid user admin [preauth] Jan 13 20:14:30 host sshd[20920]: Invalid user oracle from 194.163.142.251 port 43186 Jan 13 20:14:30 host sshd[20920]: input_userauth_request: invalid user oracle [preauth] Jan 13 20:14:30 host sshd[20911]: User centos from 194.163.142.251 not allowed because not listed in AllowUsers Jan 13 20:14:30 host sshd[20911]: input_userauth_request: invalid user centos [preauth] Jan 13 20:14:30 host sshd[20921]: Invalid user testuser from 194.163.142.251 port 43148 Jan 13 20:14:30 host sshd[20921]: input_userauth_request: invalid user testuser [preauth] Jan 13 20:14:30 host sshd[20924]: Invalid user ftpuser from 194.163.142.251 port 43176 Jan 13 20:14:30 host sshd[20924]: input_userauth_request: invalid user ftpuser [preauth] Jan 13 20:14:30 host sshd[20925]: Invalid user postgres from 194.163.142.251 port 43158 Jan 13 20:14:30 host sshd[20925]: input_userauth_request: invalid user postgres [preauth] Jan 13 20:14:30 host sshd[20926]: Invalid user student from 194.163.142.251 port 43238 Jan 13 20:14:30 host sshd[20926]: input_userauth_request: invalid user student [preauth] Jan 13 20:14:30 host sshd[20927]: Invalid user ubuntu from 194.163.142.251 port 43200 Jan 13 20:14:30 host sshd[20927]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 20:14:30 host sshd[20906]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host sshd[20914]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host unix_chkpwd[20945]: password check failed for user (root) Jan 13 20:14:30 host sshd[20912]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host sshd[20905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 user=root Jan 13 20:14:30 host sshd[20905]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:14:30 host sshd[20915]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host sshd[20923]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host sshd[20913]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host sshd[20920]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host unix_chkpwd[20946]: password check failed for user (root) Jan 13 20:14:30 host sshd[20909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 user=root Jan 13 20:14:30 host sshd[20909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:14:30 host sshd[20921]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host unix_chkpwd[20949]: password check failed for user (centos) Jan 13 20:14:30 host sshd[20911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 user=centos Jan 13 20:14:30 host unix_chkpwd[20947]: password check failed for user (root) Jan 13 20:14:30 host sshd[20910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 user=root Jan 13 20:14:30 host sshd[20910]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:14:30 host sshd[20924]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host sshd[20925]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host sshd[20926]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host unix_chkpwd[20948]: password check failed for user (root) Jan 13 20:14:30 host sshd[20916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 user=root Jan 13 20:14:30 host sshd[20916]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:14:30 host sshd[20927]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host sshd[20908]: Invalid user postgres from 194.163.142.251 port 43226 Jan 13 20:14:30 host sshd[20907]: Invalid user halo from 194.163.142.251 port 43182 Jan 13 20:14:30 host sshd[20908]: input_userauth_request: invalid user postgres [preauth] Jan 13 20:14:30 host sshd[20907]: input_userauth_request: invalid user halo [preauth] Jan 13 20:14:30 host sshd[20908]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:30 host sshd[20907]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:30 host sshd[20907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.163.142.251 Jan 13 20:14:32 host sshd[20906]: Failed password for invalid user ubuntu from 194.163.142.251 port 43236 ssh2 Jan 13 20:14:32 host sshd[20914]: Failed password for invalid user test from 194.163.142.251 port 43136 ssh2 Jan 13 20:14:32 host sshd[20912]: Failed password for invalid user user from 194.163.142.251 port 43218 ssh2 Jan 13 20:14:32 host sshd[20905]: Failed password for invalid user root from 194.163.142.251 port 43206 ssh2 Jan 13 20:14:32 host sshd[20915]: Failed password for invalid user test from 194.163.142.251 port 43220 ssh2 Jan 13 20:14:32 host sshd[20923]: Failed password for invalid user admin from 194.163.142.251 port 43152 ssh2 Jan 13 20:14:32 host sshd[20913]: Failed password for invalid user admin from 194.163.142.251 port 43234 ssh2 Jan 13 20:14:32 host sshd[20920]: Failed password for invalid user oracle from 194.163.142.251 port 43186 ssh2 Jan 13 20:14:32 host sshd[20909]: Failed password for invalid user root from 194.163.142.251 port 43142 ssh2 Jan 13 20:14:32 host sshd[20921]: Failed password for invalid user testuser from 194.163.142.251 port 43148 ssh2 Jan 13 20:14:32 host sshd[20911]: Failed password for invalid user centos from 194.163.142.251 port 43230 ssh2 Jan 13 20:14:32 host sshd[20910]: Failed password for invalid user root from 194.163.142.251 port 43212 ssh2 Jan 13 20:14:32 host sshd[20924]: Failed password for invalid user ftpuser from 194.163.142.251 port 43176 ssh2 Jan 13 20:14:32 host sshd[20925]: Failed password for invalid user postgres from 194.163.142.251 port 43158 ssh2 Jan 13 20:14:32 host sshd[20926]: Failed password for invalid user student from 194.163.142.251 port 43238 ssh2 Jan 13 20:14:32 host sshd[20916]: Failed password for invalid user root from 194.163.142.251 port 43168 ssh2 Jan 13 20:14:32 host sshd[20927]: Failed password for invalid user ubuntu from 194.163.142.251 port 43200 ssh2 Jan 13 20:14:32 host sshd[20906]: Connection closed by 194.163.142.251 port 43236 [preauth] Jan 13 20:14:32 host sshd[20914]: Connection closed by 194.163.142.251 port 43136 [preauth] Jan 13 20:14:32 host sshd[20905]: Connection closed by 194.163.142.251 port 43206 [preauth] Jan 13 20:14:32 host sshd[20912]: Connection closed by 194.163.142.251 port 43218 [preauth] Jan 13 20:14:32 host sshd[20915]: Connection closed by 194.163.142.251 port 43220 [preauth] Jan 13 20:14:32 host sshd[20913]: Connection closed by 194.163.142.251 port 43234 [preauth] Jan 13 20:14:32 host sshd[20923]: Connection closed by 194.163.142.251 port 43152 [preauth] Jan 13 20:14:32 host sshd[20909]: Connection closed by 194.163.142.251 port 43142 [preauth] Jan 13 20:14:32 host sshd[20920]: Connection closed by 194.163.142.251 port 43186 [preauth] Jan 13 20:14:32 host sshd[20911]: Connection closed by 194.163.142.251 port 43230 [preauth] Jan 13 20:14:32 host sshd[20921]: Connection closed by 194.163.142.251 port 43148 [preauth] Jan 13 20:14:32 host sshd[20910]: Connection closed by 194.163.142.251 port 43212 [preauth] Jan 13 20:14:32 host sshd[20924]: Connection closed by 194.163.142.251 port 43176 [preauth] Jan 13 20:14:32 host sshd[20925]: Connection closed by 194.163.142.251 port 43158 [preauth] Jan 13 20:14:32 host sshd[20926]: Connection closed by 194.163.142.251 port 43238 [preauth] Jan 13 20:14:32 host sshd[20916]: Connection closed by 194.163.142.251 port 43168 [preauth] Jan 13 20:14:32 host sshd[20927]: Connection closed by 194.163.142.251 port 43200 [preauth] Jan 13 20:14:32 host sshd[20908]: Failed password for invalid user postgres from 194.163.142.251 port 43226 ssh2 Jan 13 20:14:32 host sshd[20907]: Failed password for invalid user halo from 194.163.142.251 port 43182 ssh2 Jan 13 20:14:32 host sshd[20908]: Connection closed by 194.163.142.251 port 43226 [preauth] Jan 13 20:14:32 host sshd[20907]: Connection closed by 194.163.142.251 port 43182 [preauth] Jan 13 20:14:36 host sshd[20957]: Invalid user default from 211.221.36.114 port 43388 Jan 13 20:14:36 host sshd[20957]: input_userauth_request: invalid user default [preauth] Jan 13 20:14:36 host sshd[20957]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:36 host sshd[20957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.221.36.114 Jan 13 20:14:38 host sshd[20957]: Failed password for invalid user default from 211.221.36.114 port 43388 ssh2 Jan 13 20:14:50 host sshd[21011]: Invalid user gwy from 51.210.149.157 port 51302 Jan 13 20:14:50 host sshd[21011]: input_userauth_request: invalid user gwy [preauth] Jan 13 20:14:50 host sshd[21011]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:14:50 host sshd[21011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.149.157 Jan 13 20:14:52 host sshd[21011]: Failed password for invalid user gwy from 51.210.149.157 port 51302 ssh2 Jan 13 20:14:52 host sshd[21011]: Received disconnect from 51.210.149.157 port 51302:11: Bye Bye [preauth] Jan 13 20:14:52 host sshd[21011]: Disconnected from 51.210.149.157 port 51302 [preauth] Jan 13 20:15:28 host sshd[21086]: Invalid user scj from 107.189.29.149 port 35228 Jan 13 20:15:28 host sshd[21086]: input_userauth_request: invalid user scj [preauth] Jan 13 20:15:28 host sshd[21086]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:15:28 host sshd[21086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.29.149 Jan 13 20:15:30 host sshd[21086]: Failed password for invalid user scj from 107.189.29.149 port 35228 ssh2 Jan 13 20:15:30 host sshd[21086]: Received disconnect from 107.189.29.149 port 35228:11: Bye Bye [preauth] Jan 13 20:15:30 host sshd[21086]: Disconnected from 107.189.29.149 port 35228 [preauth] Jan 13 20:15:59 host sshd[21181]: Invalid user caojunliang from 51.210.149.157 port 54518 Jan 13 20:15:59 host sshd[21181]: input_userauth_request: invalid user caojunliang [preauth] Jan 13 20:15:59 host sshd[21181]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:15:59 host sshd[21181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.149.157 Jan 13 20:16:01 host sshd[21181]: Failed password for invalid user caojunliang from 51.210.149.157 port 54518 ssh2 Jan 13 20:16:17 host sshd[21246]: User root from 185.137.27.170 not allowed because not listed in AllowUsers Jan 13 20:16:17 host sshd[21246]: input_userauth_request: invalid user root [preauth] Jan 13 20:16:17 host unix_chkpwd[21249]: password check failed for user (root) Jan 13 20:16:17 host sshd[21246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.170 user=root Jan 13 20:16:17 host sshd[21246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:16:19 host sshd[21246]: Failed password for invalid user root from 185.137.27.170 port 39512 ssh2 Jan 13 20:16:19 host sshd[21246]: Received disconnect from 185.137.27.170 port 39512:11: Bye Bye [preauth] Jan 13 20:16:19 host sshd[21246]: Disconnected from 185.137.27.170 port 39512 [preauth] Jan 13 20:16:42 host sshd[21326]: Invalid user mssql from 107.189.29.149 port 36392 Jan 13 20:16:42 host sshd[21326]: input_userauth_request: invalid user mssql [preauth] Jan 13 20:16:42 host sshd[21326]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:16:42 host sshd[21326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.29.149 Jan 13 20:16:44 host sshd[21326]: Failed password for invalid user mssql from 107.189.29.149 port 36392 ssh2 Jan 13 20:16:44 host sshd[21326]: Received disconnect from 107.189.29.149 port 36392:11: Bye Bye [preauth] Jan 13 20:16:44 host sshd[21326]: Disconnected from 107.189.29.149 port 36392 [preauth] Jan 13 20:16:57 host sshd[21377]: User root from 186.13.39.199 not allowed because not listed in AllowUsers Jan 13 20:16:57 host sshd[21377]: input_userauth_request: invalid user root [preauth] Jan 13 20:16:57 host unix_chkpwd[21381]: password check failed for user (root) Jan 13 20:16:57 host sshd[21377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.13.39.199 user=root Jan 13 20:16:57 host sshd[21377]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:16:59 host sshd[21377]: Failed password for invalid user root from 186.13.39.199 port 42454 ssh2 Jan 13 20:16:59 host sshd[21377]: Received disconnect from 186.13.39.199 port 42454:11: Bye Bye [preauth] Jan 13 20:16:59 host sshd[21377]: Disconnected from 186.13.39.199 port 42454 [preauth] Jan 13 20:17:00 host sshd[21383]: Invalid user testuser from 45.133.239.165 port 48834 Jan 13 20:17:00 host sshd[21383]: input_userauth_request: invalid user testuser [preauth] Jan 13 20:17:00 host sshd[21383]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:17:00 host sshd[21383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.133.239.165 Jan 13 20:17:02 host sshd[21383]: Failed password for invalid user testuser from 45.133.239.165 port 48834 ssh2 Jan 13 20:17:02 host sshd[21383]: Received disconnect from 45.133.239.165 port 48834:11: Bye Bye [preauth] Jan 13 20:17:02 host sshd[21383]: Disconnected from 45.133.239.165 port 48834 [preauth] Jan 13 20:17:04 host sshd[21430]: Invalid user testuser from 45.225.160.66 port 46818 Jan 13 20:17:04 host sshd[21430]: input_userauth_request: invalid user testuser [preauth] Jan 13 20:17:04 host sshd[21430]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:17:04 host sshd[21430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.66 Jan 13 20:17:06 host sshd[21430]: Failed password for invalid user testuser from 45.225.160.66 port 46818 ssh2 Jan 13 20:17:06 host sshd[21430]: Received disconnect from 45.225.160.66 port 46818:11: Bye Bye [preauth] Jan 13 20:17:06 host sshd[21430]: Disconnected from 45.225.160.66 port 46818 [preauth] Jan 13 20:17:20 host sshd[21512]: Invalid user jobens from 94.182.179.181 port 37126 Jan 13 20:17:20 host sshd[21512]: input_userauth_request: invalid user jobens [preauth] Jan 13 20:17:20 host sshd[21512]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:17:20 host sshd[21512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.182.179.181 Jan 13 20:17:22 host sshd[21512]: Failed password for invalid user jobens from 94.182.179.181 port 37126 ssh2 Jan 13 20:17:22 host sshd[21512]: Received disconnect from 94.182.179.181 port 37126:11: Bye Bye [preauth] Jan 13 20:17:22 host sshd[21512]: Disconnected from 94.182.179.181 port 37126 [preauth] Jan 13 20:18:52 host sshd[21676]: Invalid user hadoop from 94.182.179.181 port 45900 Jan 13 20:18:52 host sshd[21676]: input_userauth_request: invalid user hadoop [preauth] Jan 13 20:18:52 host sshd[21676]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:18:52 host sshd[21676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.182.179.181 Jan 13 20:18:55 host sshd[21676]: Failed password for invalid user hadoop from 94.182.179.181 port 45900 ssh2 Jan 13 20:18:55 host sshd[21676]: Received disconnect from 94.182.179.181 port 45900:11: Bye Bye [preauth] Jan 13 20:18:55 host sshd[21676]: Disconnected from 94.182.179.181 port 45900 [preauth] Jan 13 20:20:21 host sshd[22006]: User root from 94.182.179.181 not allowed because not listed in AllowUsers Jan 13 20:20:21 host sshd[22006]: input_userauth_request: invalid user root [preauth] Jan 13 20:20:21 host unix_chkpwd[22014]: password check failed for user (root) Jan 13 20:20:21 host sshd[22006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.182.179.181 user=root Jan 13 20:20:21 host sshd[22006]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:20:23 host sshd[22006]: Failed password for invalid user root from 94.182.179.181 port 46350 ssh2 Jan 13 20:20:24 host sshd[22006]: Received disconnect from 94.182.179.181 port 46350:11: Bye Bye [preauth] Jan 13 20:20:24 host sshd[22006]: Disconnected from 94.182.179.181 port 46350 [preauth] Jan 13 20:21:20 host sshd[22239]: Connection reset by 218.187.128.87 port 43618 [preauth] Jan 13 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 20:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 20:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwtestugo user-2=shalinijames user-3=vfmassets user-4=pmcresources user-5=remysagr user-6=wwwkmaorg user-7=disposeat user-8=wwwkapin user-9=woodpeck user-10=kottayamcalldriv user-11=phmetals user-12=gifterman user-13=palco123 user-14=mrsclean user-15=wwwnexidigital user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=wwwrmswll user-28=keralaholi user-29=wwwresourcehunte user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 20:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Gry3AS4avYf18cWH.~ Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Gry3AS4avYf18cWH.~' Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Gry3AS4avYf18cWH.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 20:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 20:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 20:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 20:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 20:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 20:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 20:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 20:31:12 host sshd[24561]: User root from 195.191.82.212 not allowed because not listed in AllowUsers Jan 13 20:31:12 host sshd[24561]: input_userauth_request: invalid user root [preauth] Jan 13 20:31:12 host unix_chkpwd[24569]: password check failed for user (root) Jan 13 20:31:12 host sshd[24561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.191.82.212 user=root Jan 13 20:31:12 host sshd[24561]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:31:14 host sshd[24561]: Failed password for invalid user root from 195.191.82.212 port 33576 ssh2 Jan 13 20:31:14 host sshd[24561]: Received disconnect from 195.191.82.212 port 33576:11: Bye Bye [preauth] Jan 13 20:31:14 host sshd[24561]: Disconnected from 195.191.82.212 port 33576 [preauth] Jan 13 20:31:19 host sshd[24589]: Invalid user gadmon from 94.75.123.43 port 42272 Jan 13 20:31:19 host sshd[24589]: input_userauth_request: invalid user gadmon [preauth] Jan 13 20:31:19 host sshd[24589]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:31:19 host sshd[24589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.75.123.43 Jan 13 20:31:21 host sshd[24589]: Failed password for invalid user gadmon from 94.75.123.43 port 42272 ssh2 Jan 13 20:31:21 host sshd[24589]: Received disconnect from 94.75.123.43 port 42272:11: Bye Bye [preauth] Jan 13 20:31:21 host sshd[24589]: Disconnected from 94.75.123.43 port 42272 [preauth] Jan 13 20:31:58 host sshd[24718]: Invalid user gadmon from 217.160.9.187 port 40750 Jan 13 20:31:58 host sshd[24718]: input_userauth_request: invalid user gadmon [preauth] Jan 13 20:31:58 host sshd[24718]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:31:58 host sshd[24718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.9.187 Jan 13 20:31:59 host sshd[24718]: Failed password for invalid user gadmon from 217.160.9.187 port 40750 ssh2 Jan 13 20:32:00 host sshd[24718]: Received disconnect from 217.160.9.187 port 40750:11: Bye Bye [preauth] Jan 13 20:32:00 host sshd[24718]: Disconnected from 217.160.9.187 port 40750 [preauth] Jan 13 20:33:03 host sshd[24954]: User root from 164.92.143.10 not allowed because not listed in AllowUsers Jan 13 20:33:03 host sshd[24954]: input_userauth_request: invalid user root [preauth] Jan 13 20:33:03 host unix_chkpwd[24959]: password check failed for user (root) Jan 13 20:33:03 host sshd[24954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.143.10 user=root Jan 13 20:33:03 host sshd[24954]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:33:05 host sshd[24954]: Failed password for invalid user root from 164.92.143.10 port 60592 ssh2 Jan 13 20:33:05 host sshd[24954]: Received disconnect from 164.92.143.10 port 60592:11: Bye Bye [preauth] Jan 13 20:33:05 host sshd[24954]: Disconnected from 164.92.143.10 port 60592 [preauth] Jan 13 20:34:56 host sshd[25339]: Invalid user oracle from 45.119.81.249 port 52548 Jan 13 20:34:56 host sshd[25339]: input_userauth_request: invalid user oracle [preauth] Jan 13 20:34:56 host sshd[25339]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:34:56 host sshd[25339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.81.249 Jan 13 20:34:58 host sshd[25337]: Invalid user support from 220.81.33.16 port 63927 Jan 13 20:34:58 host sshd[25337]: input_userauth_request: invalid user support [preauth] Jan 13 20:34:58 host sshd[25337]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:34:58 host sshd[25337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.81.33.16 Jan 13 20:34:59 host sshd[25339]: Failed password for invalid user oracle from 45.119.81.249 port 52548 ssh2 Jan 13 20:34:59 host sshd[25339]: Received disconnect from 45.119.81.249 port 52548:11: Bye Bye [preauth] Jan 13 20:34:59 host sshd[25339]: Disconnected from 45.119.81.249 port 52548 [preauth] Jan 13 20:35:00 host sshd[25337]: Failed password for invalid user support from 220.81.33.16 port 63927 ssh2 Jan 13 20:35:02 host sshd[25337]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:35:04 host sshd[25337]: Failed password for invalid user support from 220.81.33.16 port 63927 ssh2 Jan 13 20:35:05 host sshd[25337]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:35:07 host sshd[25337]: Failed password for invalid user support from 220.81.33.16 port 63927 ssh2 Jan 13 20:35:08 host sshd[25337]: Failed password for invalid user support from 220.81.33.16 port 63927 ssh2 Jan 13 20:35:09 host sshd[25337]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:35:11 host sshd[25337]: Failed password for invalid user support from 220.81.33.16 port 63927 ssh2 Jan 13 20:35:18 host sshd[25464]: User root from 124.160.96.249 not allowed because not listed in AllowUsers Jan 13 20:35:18 host sshd[25464]: input_userauth_request: invalid user root [preauth] Jan 13 20:35:18 host unix_chkpwd[25469]: password check failed for user (root) Jan 13 20:35:18 host sshd[25464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249 user=root Jan 13 20:35:18 host sshd[25464]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:35:20 host sshd[25464]: Failed password for invalid user root from 124.160.96.249 port 9145 ssh2 Jan 13 20:35:20 host sshd[25464]: Received disconnect from 124.160.96.249 port 9145:11: Bye Bye [preauth] Jan 13 20:35:20 host sshd[25464]: Disconnected from 124.160.96.249 port 9145 [preauth] Jan 13 20:35:55 host sshd[25606]: Invalid user hduser from 212.145.210.150 port 40174 Jan 13 20:35:55 host sshd[25606]: input_userauth_request: invalid user hduser [preauth] Jan 13 20:35:55 host sshd[25606]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:35:55 host sshd[25606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.210.150 Jan 13 20:35:56 host sshd[25606]: Failed password for invalid user hduser from 212.145.210.150 port 40174 ssh2 Jan 13 20:35:56 host sshd[25606]: Received disconnect from 212.145.210.150 port 40174:11: Bye Bye [preauth] Jan 13 20:35:56 host sshd[25606]: Disconnected from 212.145.210.150 port 40174 [preauth] Jan 13 20:36:10 host sshd[25680]: Invalid user ccc from 217.160.9.187 port 60562 Jan 13 20:36:10 host sshd[25680]: input_userauth_request: invalid user ccc [preauth] Jan 13 20:36:10 host sshd[25680]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:36:10 host sshd[25680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.9.187 Jan 13 20:36:12 host sshd[25680]: Failed password for invalid user ccc from 217.160.9.187 port 60562 ssh2 Jan 13 20:36:13 host sshd[25680]: Received disconnect from 217.160.9.187 port 60562:11: Bye Bye [preauth] Jan 13 20:36:13 host sshd[25680]: Disconnected from 217.160.9.187 port 60562 [preauth] Jan 13 20:36:51 host sshd[25805]: Invalid user faculty from 94.75.123.43 port 37672 Jan 13 20:36:51 host sshd[25805]: input_userauth_request: invalid user faculty [preauth] Jan 13 20:36:51 host sshd[25805]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:36:51 host sshd[25805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.75.123.43 Jan 13 20:36:53 host sshd[25805]: Failed password for invalid user faculty from 94.75.123.43 port 37672 ssh2 Jan 13 20:36:53 host sshd[25805]: Received disconnect from 94.75.123.43 port 37672:11: Bye Bye [preauth] Jan 13 20:36:53 host sshd[25805]: Disconnected from 94.75.123.43 port 37672 [preauth] Jan 13 20:37:05 host sshd[25855]: Invalid user xujin from 164.92.143.10 port 46552 Jan 13 20:37:05 host sshd[25855]: input_userauth_request: invalid user xujin [preauth] Jan 13 20:37:05 host sshd[25855]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:37:05 host sshd[25855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.143.10 Jan 13 20:37:06 host sshd[25855]: Failed password for invalid user xujin from 164.92.143.10 port 46552 ssh2 Jan 13 20:37:07 host sshd[25855]: Received disconnect from 164.92.143.10 port 46552:11: Bye Bye [preauth] Jan 13 20:37:07 host sshd[25855]: Disconnected from 164.92.143.10 port 46552 [preauth] Jan 13 20:37:15 host sshd[25983]: Invalid user ns from 217.160.9.187 port 59198 Jan 13 20:37:15 host sshd[25983]: input_userauth_request: invalid user ns [preauth] Jan 13 20:37:15 host sshd[25983]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:37:15 host sshd[25983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.9.187 Jan 13 20:37:17 host sshd[25983]: Failed password for invalid user ns from 217.160.9.187 port 59198 ssh2 Jan 13 20:37:21 host sshd[26063]: User root from 195.191.82.212 not allowed because not listed in AllowUsers Jan 13 20:37:21 host sshd[26063]: input_userauth_request: invalid user root [preauth] Jan 13 20:37:21 host unix_chkpwd[26069]: password check failed for user (root) Jan 13 20:37:21 host sshd[26063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.191.82.212 user=root Jan 13 20:37:21 host sshd[26063]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:37:23 host sshd[26063]: Failed password for invalid user root from 195.191.82.212 port 60554 ssh2 Jan 13 20:37:23 host sshd[26063]: Received disconnect from 195.191.82.212 port 60554:11: Bye Bye [preauth] Jan 13 20:37:23 host sshd[26063]: Disconnected from 195.191.82.212 port 60554 [preauth] Jan 13 20:37:26 host sshd[26088]: Invalid user jira from 212.145.210.150 port 35178 Jan 13 20:37:26 host sshd[26088]: input_userauth_request: invalid user jira [preauth] Jan 13 20:37:26 host sshd[26088]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:37:26 host sshd[26088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.210.150 Jan 13 20:37:28 host sshd[26088]: Failed password for invalid user jira from 212.145.210.150 port 35178 ssh2 Jan 13 20:37:29 host sshd[26088]: Received disconnect from 212.145.210.150 port 35178:11: Bye Bye [preauth] Jan 13 20:37:29 host sshd[26088]: Disconnected from 212.145.210.150 port 35178 [preauth] Jan 13 20:37:33 host sshd[26155]: Invalid user ns from 45.119.81.249 port 59580 Jan 13 20:37:33 host sshd[26155]: input_userauth_request: invalid user ns [preauth] Jan 13 20:37:33 host sshd[26155]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:37:33 host sshd[26155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.81.249 Jan 13 20:37:35 host sshd[26155]: Failed password for invalid user ns from 45.119.81.249 port 59580 ssh2 Jan 13 20:37:35 host sshd[26155]: Received disconnect from 45.119.81.249 port 59580:11: Bye Bye [preauth] Jan 13 20:37:35 host sshd[26155]: Disconnected from 45.119.81.249 port 59580 [preauth] Jan 13 20:37:59 host sshd[26224]: User root from 94.75.123.43 not allowed because not listed in AllowUsers Jan 13 20:37:59 host sshd[26224]: input_userauth_request: invalid user root [preauth] Jan 13 20:37:59 host unix_chkpwd[26229]: password check failed for user (root) Jan 13 20:37:59 host sshd[26224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.75.123.43 user=root Jan 13 20:37:59 host sshd[26224]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:38:01 host sshd[26224]: Failed password for invalid user root from 94.75.123.43 port 60610 ssh2 Jan 13 20:38:01 host sshd[26224]: Received disconnect from 94.75.123.43 port 60610:11: Bye Bye [preauth] Jan 13 20:38:01 host sshd[26224]: Disconnected from 94.75.123.43 port 60610 [preauth] Jan 13 20:38:28 host sshd[26362]: Invalid user vagrant from 59.19.198.128 port 62095 Jan 13 20:38:28 host sshd[26362]: input_userauth_request: invalid user vagrant [preauth] Jan 13 20:38:28 host sshd[26362]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:38:28 host sshd[26362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.19.198.128 Jan 13 20:38:30 host sshd[26362]: Failed password for invalid user vagrant from 59.19.198.128 port 62095 ssh2 Jan 13 20:38:31 host sshd[26362]: Failed password for invalid user vagrant from 59.19.198.128 port 62095 ssh2 Jan 13 20:38:33 host sshd[26406]: Invalid user xujin from 212.145.210.150 port 49068 Jan 13 20:38:33 host sshd[26406]: input_userauth_request: invalid user xujin [preauth] Jan 13 20:38:33 host sshd[26406]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:38:33 host sshd[26406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.210.150 Jan 13 20:38:35 host sshd[26406]: Failed password for invalid user xujin from 212.145.210.150 port 49068 ssh2 Jan 13 20:38:36 host sshd[26406]: Received disconnect from 212.145.210.150 port 49068:11: Bye Bye [preauth] Jan 13 20:38:36 host sshd[26406]: Disconnected from 212.145.210.150 port 49068 [preauth] Jan 13 20:38:55 host sshd[26501]: Invalid user aegis from 45.119.81.249 port 58444 Jan 13 20:38:55 host sshd[26501]: input_userauth_request: invalid user aegis [preauth] Jan 13 20:38:55 host sshd[26501]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:38:55 host sshd[26501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.81.249 Jan 13 20:38:57 host sshd[26501]: Failed password for invalid user aegis from 45.119.81.249 port 58444 ssh2 Jan 13 20:45:34 host sshd[28051]: Invalid user nexidigital from 159.89.185.234 port 41112 Jan 13 20:45:34 host sshd[28051]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 20:45:34 host sshd[28051]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:45:34 host sshd[28051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 20:45:36 host sshd[28051]: Failed password for invalid user nexidigital from 159.89.185.234 port 41112 ssh2 Jan 13 20:45:38 host sshd[28051]: Connection closed by 159.89.185.234 port 41112 [preauth] Jan 13 20:47:13 host sshd[28362]: Invalid user pi from 118.165.159.165 port 46582 Jan 13 20:47:13 host sshd[28362]: input_userauth_request: invalid user pi [preauth] Jan 13 20:47:13 host sshd[28362]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:47:13 host sshd[28362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.165.159.165 Jan 13 20:47:15 host sshd[28362]: Failed password for invalid user pi from 118.165.159.165 port 46582 ssh2 Jan 13 20:47:17 host sshd[28362]: Connection reset by 118.165.159.165 port 46582 [preauth] Jan 13 20:47:30 host sshd[28426]: Connection closed by 102.68.141.170 port 52112 [preauth] Jan 13 20:47:33 host sshd[28430]: Invalid user admin from 102.112.25.91 port 54642 Jan 13 20:47:33 host sshd[28430]: input_userauth_request: invalid user admin [preauth] Jan 13 20:47:33 host sshd[28430]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:47:33 host sshd[28430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.112.25.91 Jan 13 20:47:35 host sshd[28430]: Failed password for invalid user admin from 102.112.25.91 port 54642 ssh2 Jan 13 20:47:36 host sshd[28430]: Connection reset by 102.112.25.91 port 54642 [preauth] Jan 13 20:49:37 host sshd[28895]: User root from 102.68.141.170 not allowed because not listed in AllowUsers Jan 13 20:49:37 host sshd[28895]: input_userauth_request: invalid user root [preauth] Jan 13 20:49:38 host unix_chkpwd[28900]: password check failed for user (root) Jan 13 20:49:38 host sshd[28895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.68.141.170 user=root Jan 13 20:49:38 host sshd[28895]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:49:39 host sshd[28895]: Failed password for invalid user root from 102.68.141.170 port 42894 ssh2 Jan 13 20:49:40 host sshd[28895]: Connection closed by 102.68.141.170 port 42894 [preauth] Jan 13 20:51:15 host sshd[29202]: Invalid user lzw from 102.68.141.170 port 60658 Jan 13 20:51:15 host sshd[29202]: input_userauth_request: invalid user lzw [preauth] Jan 13 20:51:15 host sshd[29202]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:51:15 host sshd[29202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.68.141.170 Jan 13 20:51:18 host sshd[29202]: Failed password for invalid user lzw from 102.68.141.170 port 60658 ssh2 Jan 13 20:51:18 host sshd[29202]: Connection closed by 102.68.141.170 port 60658 [preauth] Jan 13 20:52:26 host sshd[29429]: Invalid user vadmin from 125.133.185.224 port 60665 Jan 13 20:52:26 host sshd[29429]: input_userauth_request: invalid user vadmin [preauth] Jan 13 20:52:26 host sshd[29429]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:52:26 host sshd[29429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.133.185.224 Jan 13 20:52:29 host sshd[29429]: Failed password for invalid user vadmin from 125.133.185.224 port 60665 ssh2 Jan 13 20:52:30 host sshd[29429]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:52:32 host sshd[29429]: Failed password for invalid user vadmin from 125.133.185.224 port 60665 ssh2 Jan 13 20:52:33 host sshd[29429]: Connection reset by 125.133.185.224 port 60665 [preauth] Jan 13 20:52:33 host sshd[29429]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.133.185.224 Jan 13 20:52:48 host sshd[29510]: Bad protocol version identification 'GET / HTTP/1.1' from 162.243.162.122 port 57480 Jan 13 20:52:49 host sshd[29513]: Bad protocol version identification 'GET /script HTTP/1.1' from 162.243.162.122 port 57562 Jan 13 20:53:47 host sshd[29747]: Invalid user pearlynixon@ugotechnologies.com from 138.59.11.44 port 62822 Jan 13 20:53:47 host sshd[29747]: input_userauth_request: invalid user pearlynixon@ugotechnologies.com [preauth] Jan 13 20:53:47 host sshd[29747]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:53:47 host sshd[29747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.59.11.44 Jan 13 20:53:50 host sshd[29747]: Failed password for invalid user pearlynixon@ugotechnologies.com from 138.59.11.44 port 62822 ssh2 Jan 13 20:53:50 host sshd[29747]: Connection closed by 138.59.11.44 port 62822 [preauth] Jan 13 20:53:52 host sshd[29764]: User root from 138.59.11.44 not allowed because not listed in AllowUsers Jan 13 20:53:52 host sshd[29764]: input_userauth_request: invalid user root [preauth] Jan 13 20:53:52 host unix_chkpwd[29778]: password check failed for user (root) Jan 13 20:53:52 host sshd[29764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.59.11.44 user=root Jan 13 20:53:52 host sshd[29764]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:53:54 host sshd[29764]: Failed password for invalid user root from 138.59.11.44 port 63797 ssh2 Jan 13 20:53:55 host sshd[29764]: Connection closed by 138.59.11.44 port 63797 [preauth] Jan 13 20:53:56 host sshd[29784]: Invalid user pearlynixon from 138.59.11.44 port 64768 Jan 13 20:53:56 host sshd[29784]: input_userauth_request: invalid user pearlynixon [preauth] Jan 13 20:55:34 host sshd[30113]: Invalid user admin from 208.180.135.3 port 60088 Jan 13 20:55:34 host sshd[30113]: input_userauth_request: invalid user admin [preauth] Jan 13 20:55:34 host sshd[30113]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:55:34 host sshd[30113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.180.135.3 Jan 13 20:55:35 host sshd[30120]: Invalid user passwd from 1.245.61.144 port 58072 Jan 13 20:55:35 host sshd[30120]: input_userauth_request: invalid user passwd [preauth] Jan 13 20:55:35 host sshd[30120]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:55:35 host sshd[30120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.245.61.144 Jan 13 20:55:36 host sshd[30113]: Failed password for invalid user admin from 208.180.135.3 port 60088 ssh2 Jan 13 20:55:37 host sshd[30120]: Failed password for invalid user passwd from 1.245.61.144 port 58072 ssh2 Jan 13 20:55:37 host sshd[30120]: Received disconnect from 1.245.61.144 port 58072:11: Bye Bye [preauth] Jan 13 20:55:37 host sshd[30120]: Disconnected from 1.245.61.144 port 58072 [preauth] Jan 13 20:55:37 host sshd[30113]: Failed password for invalid user admin from 208.180.135.3 port 60088 ssh2 Jan 13 20:55:38 host sshd[30113]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:55:40 host sshd[30113]: Failed password for invalid user admin from 208.180.135.3 port 60088 ssh2 Jan 13 20:55:41 host sshd[30113]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:55:43 host sshd[30113]: Failed password for invalid user admin from 208.180.135.3 port 60088 ssh2 Jan 13 20:55:43 host sshd[30113]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:55:45 host sshd[30113]: Failed password for invalid user admin from 208.180.135.3 port 60088 ssh2 Jan 13 20:55:46 host sshd[30113]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:55:48 host sshd[30113]: Failed password for invalid user admin from 208.180.135.3 port 60088 ssh2 Jan 13 20:55:48 host sshd[30113]: error: maximum authentication attempts exceeded for invalid user admin from 208.180.135.3 port 60088 ssh2 [preauth] Jan 13 20:55:48 host sshd[30113]: Disconnecting: Too many authentication failures [preauth] Jan 13 20:55:48 host sshd[30113]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.180.135.3 Jan 13 20:55:48 host sshd[30113]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 13 20:55:55 host sshd[30339]: Invalid user yinjun from 2.78.61.154 port 49718 Jan 13 20:55:55 host sshd[30339]: input_userauth_request: invalid user yinjun [preauth] Jan 13 20:55:55 host sshd[30339]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:55:55 host sshd[30339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.78.61.154 Jan 13 20:55:57 host sshd[30339]: Failed password for invalid user yinjun from 2.78.61.154 port 49718 ssh2 Jan 13 20:55:57 host sshd[30339]: Received disconnect from 2.78.61.154 port 49718:11: Bye Bye [preauth] Jan 13 20:55:57 host sshd[30339]: Disconnected from 2.78.61.154 port 49718 [preauth] Jan 13 20:56:03 host sshd[30378]: Invalid user internet from 152.32.133.174 port 12408 Jan 13 20:56:03 host sshd[30378]: input_userauth_request: invalid user internet [preauth] Jan 13 20:56:03 host sshd[30378]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:56:03 host sshd[30378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.133.174 Jan 13 20:56:04 host sshd[30378]: Failed password for invalid user internet from 152.32.133.174 port 12408 ssh2 Jan 13 20:56:04 host sshd[30378]: Received disconnect from 152.32.133.174 port 12408:11: Bye Bye [preauth] Jan 13 20:56:04 host sshd[30378]: Disconnected from 152.32.133.174 port 12408 [preauth] Jan 13 20:56:25 host sshd[30432]: Invalid user Oracle from 124.160.96.249 port 46161 Jan 13 20:56:25 host sshd[30432]: input_userauth_request: invalid user Oracle [preauth] Jan 13 20:56:25 host sshd[30432]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:56:25 host sshd[30432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249 Jan 13 20:56:26 host sshd[30432]: Failed password for invalid user Oracle from 124.160.96.249 port 46161 ssh2 Jan 13 20:56:27 host sshd[30432]: Received disconnect from 124.160.96.249 port 46161:11: Bye Bye [preauth] Jan 13 20:56:27 host sshd[30432]: Disconnected from 124.160.96.249 port 46161 [preauth] Jan 13 20:56:45 host sshd[30528]: User root from 112.172.237.26 not allowed because not listed in AllowUsers Jan 13 20:56:45 host sshd[30528]: input_userauth_request: invalid user root [preauth] Jan 13 20:56:45 host unix_chkpwd[30534]: password check failed for user (root) Jan 13 20:56:45 host sshd[30528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.172.237.26 user=root Jan 13 20:56:45 host sshd[30528]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:56:47 host sshd[30528]: Failed password for invalid user root from 112.172.237.26 port 60018 ssh2 Jan 13 20:56:48 host unix_chkpwd[30543]: password check failed for user (root) Jan 13 20:56:48 host sshd[30528]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:56:49 host sshd[30528]: Failed password for invalid user root from 112.172.237.26 port 60018 ssh2 Jan 13 20:56:50 host unix_chkpwd[30550]: password check failed for user (root) Jan 13 20:56:50 host sshd[30528]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:56:52 host sshd[30528]: Failed password for invalid user root from 112.172.237.26 port 60018 ssh2 Jan 13 20:56:53 host unix_chkpwd[30564]: password check failed for user (root) Jan 13 20:56:53 host sshd[30528]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 20:56:55 host sshd[30528]: Failed password for invalid user root from 112.172.237.26 port 60018 ssh2 Jan 13 20:57:16 host sshd[30660]: Invalid user lzh from 141.94.203.217 port 51050 Jan 13 20:57:16 host sshd[30660]: input_userauth_request: invalid user lzh [preauth] Jan 13 20:57:16 host sshd[30660]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:57:16 host sshd[30660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.94.203.217 Jan 13 20:57:18 host sshd[30660]: Failed password for invalid user lzh from 141.94.203.217 port 51050 ssh2 Jan 13 20:57:18 host sshd[30660]: Received disconnect from 141.94.203.217 port 51050:11: Bye Bye [preauth] Jan 13 20:57:18 host sshd[30660]: Disconnected from 141.94.203.217 port 51050 [preauth] Jan 13 20:57:50 host sshd[30769]: Invalid user paul from 220.158.232.214 port 47636 Jan 13 20:57:50 host sshd[30769]: input_userauth_request: invalid user paul [preauth] Jan 13 20:57:50 host sshd[30769]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:57:50 host sshd[30769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.158.232.214 Jan 13 20:57:52 host sshd[30769]: Failed password for invalid user paul from 220.158.232.214 port 47636 ssh2 Jan 13 20:57:52 host sshd[30769]: Received disconnect from 220.158.232.214 port 47636:11: Bye Bye [preauth] Jan 13 20:57:52 host sshd[30769]: Disconnected from 220.158.232.214 port 47636 [preauth] Jan 13 20:58:05 host sshd[30836]: Invalid user fufn from 128.199.185.176 port 59026 Jan 13 20:58:05 host sshd[30836]: input_userauth_request: invalid user fufn [preauth] Jan 13 20:58:05 host sshd[30836]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:58:05 host sshd[30836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.185.176 Jan 13 20:58:07 host sshd[30836]: Failed password for invalid user fufn from 128.199.185.176 port 59026 ssh2 Jan 13 20:58:07 host sshd[30836]: Received disconnect from 128.199.185.176 port 59026:11: Bye Bye [preauth] Jan 13 20:58:07 host sshd[30836]: Disconnected from 128.199.185.176 port 59026 [preauth] Jan 13 20:59:30 host sshd[31098]: Invalid user guest from 141.94.203.217 port 57618 Jan 13 20:59:30 host sshd[31098]: input_userauth_request: invalid user guest [preauth] Jan 13 20:59:30 host sshd[31098]: pam_unix(sshd:auth): check pass; user unknown Jan 13 20:59:30 host sshd[31098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.94.203.217 Jan 13 20:59:32 host sshd[31098]: Failed password for invalid user guest from 141.94.203.217 port 57618 ssh2 Jan 13 20:59:33 host sshd[31098]: Received disconnect from 141.94.203.217 port 57618:11: Bye Bye [preauth] Jan 13 20:59:33 host sshd[31098]: Disconnected from 141.94.203.217 port 57618 [preauth] Jan 13 21:00:26 host sshd[31241]: Connection closed by 152.32.133.174 port 55714 [preauth] Jan 13 21:00:45 host sshd[31322]: Invalid user xs from 141.94.203.217 port 57016 Jan 13 21:00:45 host sshd[31322]: input_userauth_request: invalid user xs [preauth] Jan 13 21:00:45 host sshd[31322]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:00:45 host sshd[31322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.94.203.217 Jan 13 21:00:46 host sshd[31322]: Failed password for invalid user xs from 141.94.203.217 port 57016 ssh2 Jan 13 21:00:47 host sshd[31322]: Received disconnect from 141.94.203.217 port 57016:11: Bye Bye [preauth] Jan 13 21:00:47 host sshd[31322]: Disconnected from 141.94.203.217 port 57016 [preauth] Jan 13 21:01:10 host sshd[31550]: Invalid user nagios from 128.199.185.176 port 55592 Jan 13 21:01:10 host sshd[31550]: input_userauth_request: invalid user nagios [preauth] Jan 13 21:01:10 host sshd[31550]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:01:10 host sshd[31550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.185.176 Jan 13 21:01:12 host sshd[31550]: Failed password for invalid user nagios from 128.199.185.176 port 55592 ssh2 Jan 13 21:01:12 host sshd[31550]: Received disconnect from 128.199.185.176 port 55592:11: Bye Bye [preauth] Jan 13 21:01:12 host sshd[31550]: Disconnected from 128.199.185.176 port 55592 [preauth] Jan 13 21:01:16 host sshd[31562]: Invalid user eda from 1.245.61.144 port 50376 Jan 13 21:01:16 host sshd[31562]: input_userauth_request: invalid user eda [preauth] Jan 13 21:01:16 host sshd[31562]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:01:16 host sshd[31562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.245.61.144 Jan 13 21:01:18 host sshd[31562]: Failed password for invalid user eda from 1.245.61.144 port 50376 ssh2 Jan 13 21:01:18 host sshd[31562]: Received disconnect from 1.245.61.144 port 50376:11: Bye Bye [preauth] Jan 13 21:01:18 host sshd[31562]: Disconnected from 1.245.61.144 port 50376 [preauth] Jan 13 21:02:22 host sshd[31761]: Invalid user gitlab from 128.199.185.176 port 43860 Jan 13 21:02:22 host sshd[31761]: input_userauth_request: invalid user gitlab [preauth] Jan 13 21:02:22 host sshd[31761]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:02:22 host sshd[31761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.185.176 Jan 13 21:02:24 host sshd[31761]: Failed password for invalid user gitlab from 128.199.185.176 port 43860 ssh2 Jan 13 21:02:24 host sshd[31761]: Received disconnect from 128.199.185.176 port 43860:11: Bye Bye [preauth] Jan 13 21:02:24 host sshd[31761]: Disconnected from 128.199.185.176 port 43860 [preauth] Jan 13 21:02:32 host sshd[31836]: Invalid user impala from 1.245.61.144 port 44684 Jan 13 21:02:32 host sshd[31836]: input_userauth_request: invalid user impala [preauth] Jan 13 21:02:32 host sshd[31836]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:02:32 host sshd[31836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.245.61.144 Jan 13 21:02:33 host sshd[31831]: Invalid user zhz from 2.78.61.154 port 37916 Jan 13 21:02:33 host sshd[31831]: input_userauth_request: invalid user zhz [preauth] Jan 13 21:02:33 host sshd[31831]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:02:33 host sshd[31831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.78.61.154 Jan 13 21:02:34 host sshd[31836]: Failed password for invalid user impala from 1.245.61.144 port 44684 ssh2 Jan 13 21:02:34 host sshd[31836]: Received disconnect from 1.245.61.144 port 44684:11: Bye Bye [preauth] Jan 13 21:02:34 host sshd[31836]: Disconnected from 1.245.61.144 port 44684 [preauth] Jan 13 21:02:35 host sshd[31831]: Failed password for invalid user zhz from 2.78.61.154 port 37916 ssh2 Jan 13 21:02:35 host sshd[31831]: Received disconnect from 2.78.61.154 port 37916:11: Bye Bye [preauth] Jan 13 21:02:35 host sshd[31831]: Disconnected from 2.78.61.154 port 37916 [preauth] Jan 13 21:03:01 host sshd[31951]: Invalid user pyf from 152.32.133.174 port 27962 Jan 13 21:03:01 host sshd[31951]: input_userauth_request: invalid user pyf [preauth] Jan 13 21:03:01 host sshd[31951]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:03:01 host sshd[31951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.133.174 Jan 13 21:03:03 host sshd[31951]: Failed password for invalid user pyf from 152.32.133.174 port 27962 ssh2 Jan 13 21:03:03 host sshd[31951]: Received disconnect from 152.32.133.174 port 27962:11: Bye Bye [preauth] Jan 13 21:03:03 host sshd[31951]: Disconnected from 152.32.133.174 port 27962 [preauth] Jan 13 21:05:50 host sshd[32469]: Invalid user minal from 2.78.61.154 port 53112 Jan 13 21:05:50 host sshd[32469]: input_userauth_request: invalid user minal [preauth] Jan 13 21:05:50 host sshd[32469]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:05:50 host sshd[32469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.78.61.154 Jan 13 21:05:52 host sshd[32469]: Failed password for invalid user minal from 2.78.61.154 port 53112 ssh2 Jan 13 21:05:55 host sshd[32442]: Connection closed by 152.32.133.174 port 55212 [preauth] Jan 13 21:06:55 host sshd[353]: User root from 220.158.232.214 not allowed because not listed in AllowUsers Jan 13 21:06:55 host sshd[353]: input_userauth_request: invalid user root [preauth] Jan 13 21:06:55 host unix_chkpwd[357]: password check failed for user (root) Jan 13 21:06:55 host sshd[353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.158.232.214 user=root Jan 13 21:06:55 host sshd[353]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 21:06:58 host sshd[353]: Failed password for invalid user root from 220.158.232.214 port 48028 ssh2 Jan 13 21:06:58 host sshd[353]: Received disconnect from 220.158.232.214 port 48028:11: Bye Bye [preauth] Jan 13 21:06:58 host sshd[353]: Disconnected from 220.158.232.214 port 48028 [preauth] Jan 13 21:08:21 host sshd[640]: Connection closed by 152.32.133.174 port 27462 [preauth] Jan 13 21:10:55 host sshd[1144]: Connection closed by 152.32.133.174 port 54708 [preauth] Jan 13 21:16:11 host sshd[2381]: Connection closed by 152.32.133.174 port 54200 [preauth] Jan 13 21:18:39 host sshd[3075]: User root from 152.32.133.174 not allowed because not listed in AllowUsers Jan 13 21:18:39 host sshd[3075]: input_userauth_request: invalid user root [preauth] Jan 13 21:18:39 host unix_chkpwd[3080]: password check failed for user (root) Jan 13 21:18:39 host sshd[3075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.133.174 user=root Jan 13 21:18:39 host sshd[3075]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 21:18:42 host sshd[3075]: Failed password for invalid user root from 152.32.133.174 port 26450 ssh2 Jan 13 21:18:42 host sshd[3075]: Received disconnect from 152.32.133.174 port 26450:11: Bye Bye [preauth] Jan 13 21:18:42 host sshd[3075]: Disconnected from 152.32.133.174 port 26450 [preauth] Jan 13 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 21:21:59 host sshd[3859]: Invalid user sean from 107.189.30.59 port 44952 Jan 13 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:21:59 host sshd[3859]: input_userauth_request: invalid user sean [preauth] Jan 13 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:21:59 host sshd[3859]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:21:59 host sshd[3859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 13 21:22:00 host sshd[3859]: Failed password for invalid user sean from 107.189.30.59 port 44952 ssh2 Jan 13 21:22:01 host sshd[3859]: Connection closed by 107.189.30.59 port 44952 [preauth] Jan 13 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 21:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 21:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=disposeat user-4=wwwkmaorg user-5=remysagr user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=straightcurve user-11=wwwletsstalkfood user-12=wwwevmhonda user-13=bonifacegroup user-14=mrsclean user-15=wwwnexidigital user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 21:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 21:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-myFBnRfTzUHGOTOw.~ Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-myFBnRfTzUHGOTOw.~' Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-myFBnRfTzUHGOTOw.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 21:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 21:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 21:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 21:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 21:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 21:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 21:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 21:24:41 host sshd[4713]: Invalid user dp from 194.110.203.109 port 51704 Jan 13 21:24:41 host sshd[4713]: input_userauth_request: invalid user dp [preauth] Jan 13 21:24:41 host sshd[4713]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:24:41 host sshd[4713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 21:24:43 host sshd[4713]: Failed password for invalid user dp from 194.110.203.109 port 51704 ssh2 Jan 13 21:24:47 host sshd[4713]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:24:49 host sshd[4713]: Failed password for invalid user dp from 194.110.203.109 port 51704 ssh2 Jan 13 21:24:53 host sshd[4713]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:24:55 host sshd[4713]: Failed password for invalid user dp from 194.110.203.109 port 51704 ssh2 Jan 13 21:24:58 host sshd[4713]: Connection closed by 194.110.203.109 port 51704 [preauth] Jan 13 21:24:58 host sshd[4713]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 21:27:35 host sshd[5268]: User root from 121.171.103.250 not allowed because not listed in AllowUsers Jan 13 21:27:35 host sshd[5268]: input_userauth_request: invalid user root [preauth] Jan 13 21:27:35 host unix_chkpwd[5270]: password check failed for user (root) Jan 13 21:27:35 host sshd[5268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.171.103.250 user=root Jan 13 21:27:35 host sshd[5268]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 21:27:37 host sshd[5268]: Failed password for invalid user root from 121.171.103.250 port 62887 ssh2 Jan 13 21:27:37 host unix_chkpwd[5276]: password check failed for user (root) Jan 13 21:27:37 host sshd[5268]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 21:27:38 host sshd[5268]: Failed password for invalid user root from 121.171.103.250 port 62887 ssh2 Jan 13 21:27:39 host unix_chkpwd[5282]: password check failed for user (root) Jan 13 21:27:39 host sshd[5268]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 21:27:41 host sshd[5268]: Failed password for invalid user root from 121.171.103.250 port 62887 ssh2 Jan 13 21:27:41 host unix_chkpwd[5287]: password check failed for user (root) Jan 13 21:27:41 host sshd[5268]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 21:27:44 host sshd[5268]: Failed password for invalid user root from 121.171.103.250 port 62887 ssh2 Jan 13 21:30:53 host sshd[5959]: Invalid user ubuntu from 59.126.92.156 port 58978 Jan 13 21:30:53 host sshd[5959]: input_userauth_request: invalid user ubuntu [preauth] Jan 13 21:30:53 host sshd[5959]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:30:53 host sshd[5959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.92.156 Jan 13 21:30:55 host sshd[5959]: Failed password for invalid user ubuntu from 59.126.92.156 port 58978 ssh2 Jan 13 21:30:56 host sshd[5959]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:30:58 host sshd[5959]: Failed password for invalid user ubuntu from 59.126.92.156 port 58978 ssh2 Jan 13 21:30:59 host sshd[5959]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:31:01 host sshd[5959]: Failed password for invalid user ubuntu from 59.126.92.156 port 58978 ssh2 Jan 13 21:31:01 host sshd[5959]: Connection reset by 59.126.92.156 port 58978 [preauth] Jan 13 21:31:01 host sshd[5959]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.92.156 Jan 13 21:36:48 host sshd[7144]: Invalid user admin from 60.53.202.108 port 42367 Jan 13 21:36:48 host sshd[7144]: input_userauth_request: invalid user admin [preauth] Jan 13 21:36:48 host sshd[7144]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:36:48 host sshd[7144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.53.202.108 Jan 13 21:36:49 host sshd[7144]: Failed password for invalid user admin from 60.53.202.108 port 42367 ssh2 Jan 13 21:36:50 host sshd[7144]: Failed password for invalid user admin from 60.53.202.108 port 42367 ssh2 Jan 13 21:36:51 host sshd[7144]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:36:52 host sshd[7144]: Failed password for invalid user admin from 60.53.202.108 port 42367 ssh2 Jan 13 21:36:53 host sshd[7144]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:36:55 host sshd[7144]: Failed password for invalid user admin from 60.53.202.108 port 42367 ssh2 Jan 13 21:36:56 host sshd[7144]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:36:58 host sshd[7144]: Failed password for invalid user admin from 60.53.202.108 port 42367 ssh2 Jan 13 21:36:58 host sshd[7144]: Connection reset by 60.53.202.108 port 42367 [preauth] Jan 13 21:36:58 host sshd[7144]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.53.202.108 Jan 13 21:36:58 host sshd[7144]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 13 21:38:30 host sshd[7472]: Connection reset by 122.117.58.111 port 58136 [preauth] Jan 13 21:55:15 host sshd[10851]: Invalid user default from 211.195.204.30 port 60821 Jan 13 21:55:15 host sshd[10851]: input_userauth_request: invalid user default [preauth] Jan 13 21:55:15 host sshd[10851]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:55:15 host sshd[10851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.204.30 Jan 13 21:55:17 host sshd[10851]: Failed password for invalid user default from 211.195.204.30 port 60821 ssh2 Jan 13 21:55:18 host sshd[10851]: pam_unix(sshd:auth): check pass; user unknown Jan 13 21:55:20 host sshd[10851]: Failed password for invalid user default from 211.195.204.30 port 60821 ssh2 Jan 13 21:55:20 host sshd[10851]: Connection reset by 211.195.204.30 port 60821 [preauth] Jan 13 21:55:20 host sshd[10851]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.204.30 Jan 13 21:59:31 host sshd[11777]: Connection reset by 211.60.38.72 port 60713 [preauth] Jan 13 22:08:43 host sshd[13907]: Invalid user signa from 205.185.113.129 port 53216 Jan 13 22:08:43 host sshd[13907]: input_userauth_request: invalid user signa [preauth] Jan 13 22:08:43 host sshd[13907]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:08:43 host sshd[13907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 13 22:08:45 host sshd[13907]: Failed password for invalid user signa from 205.185.113.129 port 53216 ssh2 Jan 13 22:08:46 host sshd[13907]: Connection closed by 205.185.113.129 port 53216 [preauth] Jan 13 22:09:26 host sshd[14046]: Invalid user nexidigital from 159.89.185.234 port 36232 Jan 13 22:09:26 host sshd[14046]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 22:09:26 host sshd[14046]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:09:26 host sshd[14046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 22:09:28 host sshd[14046]: Failed password for invalid user nexidigital from 159.89.185.234 port 36232 ssh2 Jan 13 22:09:29 host sshd[14046]: Connection closed by 159.89.185.234 port 36232 [preauth] Jan 13 22:15:00 host sshd[15209]: Invalid user admin from 121.166.213.186 port 62418 Jan 13 22:15:00 host sshd[15209]: input_userauth_request: invalid user admin [preauth] Jan 13 22:15:00 host sshd[15209]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:15:00 host sshd[15209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.213.186 Jan 13 22:15:02 host sshd[15209]: Failed password for invalid user admin from 121.166.213.186 port 62418 ssh2 Jan 13 22:15:03 host sshd[15209]: Failed password for invalid user admin from 121.166.213.186 port 62418 ssh2 Jan 13 22:15:04 host sshd[15209]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:15:06 host sshd[15209]: Failed password for invalid user admin from 121.166.213.186 port 62418 ssh2 Jan 13 22:15:07 host sshd[15209]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:15:09 host sshd[15209]: Failed password for invalid user admin from 121.166.213.186 port 62418 ssh2 Jan 13 22:16:21 host sshd[15499]: Connection reset by 112.184.189.46 port 40005 [preauth] Jan 13 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 22:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 22:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 22:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwresourcehunte user-3=keralaholi user-4=wwwrmswll user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=cochintaxi user-11=wwwkaretakers user-12=mrsclean user-13=wwwnexidigital user-14=kottayamcalldriv user-15=phmetals user-16=palco123 user-17=gifterman user-18=straightcurve user-19=wwwletsstalkfood user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=shalinijames user-24=wwwtestugo user-25=vfmassets user-26=woodpeck user-27=wwwkapin user-28=wwwkmaorg user-29=disposeat user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 22:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3TtAxVQw7j1I0lN1.~ Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3TtAxVQw7j1I0lN1.~' Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3TtAxVQw7j1I0lN1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 22:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 22:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 22:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 22:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 22:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 22:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 22:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 22:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 22:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 22:27:04 host sshd[17679]: Invalid user nginx from 220.133.150.181 port 41380 Jan 13 22:27:04 host sshd[17679]: input_userauth_request: invalid user nginx [preauth] Jan 13 22:27:04 host sshd[17679]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:27:04 host sshd[17679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.150.181 Jan 13 22:27:06 host sshd[17679]: Failed password for invalid user nginx from 220.133.150.181 port 41380 ssh2 Jan 13 22:27:07 host sshd[17679]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:27:09 host sshd[17679]: Failed password for invalid user nginx from 220.133.150.181 port 41380 ssh2 Jan 13 22:27:09 host sshd[17679]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:27:12 host sshd[17679]: Failed password for invalid user nginx from 220.133.150.181 port 41380 ssh2 Jan 13 22:27:12 host sshd[17679]: Connection reset by 220.133.150.181 port 41380 [preauth] Jan 13 22:27:12 host sshd[17679]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.150.181 Jan 13 22:31:21 host sshd[18258]: Invalid user admin from 1.170.95.93 port 53834 Jan 13 22:31:21 host sshd[18258]: input_userauth_request: invalid user admin [preauth] Jan 13 22:31:21 host sshd[18258]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:31:21 host sshd[18258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.170.95.93 Jan 13 22:31:23 host sshd[18258]: Failed password for invalid user admin from 1.170.95.93 port 53834 ssh2 Jan 13 22:31:24 host sshd[18258]: Failed password for invalid user admin from 1.170.95.93 port 53834 ssh2 Jan 13 22:31:24 host sshd[18258]: Connection reset by 1.170.95.93 port 53834 [preauth] Jan 13 22:31:53 host sshd[18324]: Invalid user Admin from 112.171.253.220 port 63402 Jan 13 22:31:53 host sshd[18324]: input_userauth_request: invalid user Admin [preauth] Jan 13 22:31:53 host sshd[18324]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:31:53 host sshd[18324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.171.253.220 Jan 13 22:31:54 host sshd[18324]: Failed password for invalid user Admin from 112.171.253.220 port 63402 ssh2 Jan 13 22:31:55 host sshd[18324]: Connection reset by 112.171.253.220 port 63402 [preauth] Jan 13 22:39:44 host sshd[19303]: Invalid user zyfwp from 14.39.25.6 port 61424 Jan 13 22:39:44 host sshd[19303]: input_userauth_request: invalid user zyfwp [preauth] Jan 13 22:39:44 host sshd[19303]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:39:44 host sshd[19303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.39.25.6 Jan 13 22:39:47 host sshd[19303]: Failed password for invalid user zyfwp from 14.39.25.6 port 61424 ssh2 Jan 13 22:39:48 host sshd[19303]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:39:50 host sshd[19303]: Failed password for invalid user zyfwp from 14.39.25.6 port 61424 ssh2 Jan 13 22:39:51 host sshd[19303]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:39:53 host sshd[19303]: Failed password for invalid user zyfwp from 14.39.25.6 port 61424 ssh2 Jan 13 22:42:08 host sshd[19664]: Invalid user dnsekakf2$$ from 173.165.107.34 port 46168 Jan 13 22:42:08 host sshd[19664]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 13 22:42:08 host sshd[19664]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:42:08 host sshd[19664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.165.107.34 Jan 13 22:42:10 host sshd[19664]: Failed password for invalid user dnsekakf2$$ from 173.165.107.34 port 46168 ssh2 Jan 13 22:42:11 host sshd[19664]: Failed password for invalid user dnsekakf2$$ from 173.165.107.34 port 46168 ssh2 Jan 13 22:42:11 host sshd[19664]: Connection closed by 173.165.107.34 port 46168 [preauth] Jan 13 22:55:43 host sshd[21499]: Invalid user default from 114.34.8.68 port 33858 Jan 13 22:55:43 host sshd[21499]: input_userauth_request: invalid user default [preauth] Jan 13 22:55:43 host sshd[21499]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:55:43 host sshd[21499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.8.68 Jan 13 22:55:45 host sshd[21499]: Failed password for invalid user default from 114.34.8.68 port 33858 ssh2 Jan 13 22:55:45 host sshd[21499]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:55:47 host sshd[21499]: Failed password for invalid user default from 114.34.8.68 port 33858 ssh2 Jan 13 22:55:48 host sshd[21499]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:55:50 host sshd[21499]: Failed password for invalid user default from 114.34.8.68 port 33858 ssh2 Jan 13 22:56:59 host sshd[21773]: Invalid user admin from 112.148.167.229 port 40373 Jan 13 22:56:59 host sshd[21773]: input_userauth_request: invalid user admin [preauth] Jan 13 22:56:59 host sshd[21773]: Failed none for invalid user admin from 112.148.167.229 port 40373 ssh2 Jan 13 22:57:00 host sshd[21773]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:57:00 host sshd[21773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.148.167.229 Jan 13 22:57:02 host sshd[21773]: Failed password for invalid user admin from 112.148.167.229 port 40373 ssh2 Jan 13 22:57:02 host sshd[21773]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:57:04 host sshd[21773]: Failed password for invalid user admin from 112.148.167.229 port 40373 ssh2 Jan 13 22:57:04 host sshd[21773]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:57:06 host sshd[21773]: Failed password for invalid user admin from 112.148.167.229 port 40373 ssh2 Jan 13 22:57:07 host sshd[21773]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:57:08 host sshd[21773]: Failed password for invalid user admin from 112.148.167.229 port 40373 ssh2 Jan 13 22:57:08 host sshd[21773]: pam_unix(sshd:auth): check pass; user unknown Jan 13 22:57:10 host sshd[21773]: Failed password for invalid user admin from 112.148.167.229 port 40373 ssh2 Jan 13 22:57:10 host sshd[21773]: error: maximum authentication attempts exceeded for invalid user admin from 112.148.167.229 port 40373 ssh2 [preauth] Jan 13 22:57:10 host sshd[21773]: Disconnecting: Too many authentication failures [preauth] Jan 13 22:57:10 host sshd[21773]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.148.167.229 Jan 13 22:57:10 host sshd[21773]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 13 23:00:17 host sshd[22276]: User root from 193.35.18.107 not allowed because not listed in AllowUsers Jan 13 23:00:17 host sshd[22276]: input_userauth_request: invalid user root [preauth] Jan 13 23:00:17 host unix_chkpwd[22281]: password check failed for user (root) Jan 13 23:00:17 host sshd[22276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.35.18.107 user=root Jan 13 23:00:17 host sshd[22276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:00:20 host sshd[22276]: Failed password for invalid user root from 193.35.18.107 port 58974 ssh2 Jan 13 23:00:20 host sshd[22276]: Received disconnect from 193.35.18.107 port 58974:11: Bye Bye [preauth] Jan 13 23:00:20 host sshd[22276]: Disconnected from 193.35.18.107 port 58974 [preauth] Jan 13 23:00:22 host sshd[22285]: User root from 193.35.18.107 not allowed because not listed in AllowUsers Jan 13 23:00:22 host sshd[22285]: input_userauth_request: invalid user root [preauth] Jan 13 23:00:22 host unix_chkpwd[22291]: password check failed for user (root) Jan 13 23:00:22 host sshd[22285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.35.18.107 user=root Jan 13 23:00:22 host sshd[22285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:00:25 host sshd[22285]: Failed password for invalid user root from 193.35.18.107 port 35750 ssh2 Jan 13 23:00:25 host sshd[22285]: Received disconnect from 193.35.18.107 port 35750:11: Bye Bye [preauth] Jan 13 23:00:25 host sshd[22285]: Disconnected from 193.35.18.107 port 35750 [preauth] Jan 13 23:00:26 host sshd[22296]: User root from 193.35.18.107 not allowed because not listed in AllowUsers Jan 13 23:00:26 host sshd[22296]: input_userauth_request: invalid user root [preauth] Jan 13 23:00:26 host unix_chkpwd[22325]: password check failed for user (root) Jan 13 23:00:26 host sshd[22296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.35.18.107 user=root Jan 13 23:00:26 host sshd[22296]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:00:28 host sshd[22296]: Failed password for invalid user root from 193.35.18.107 port 40640 ssh2 Jan 13 23:06:00 host sshd[23172]: Invalid user usr from 14.45.101.32 port 61416 Jan 13 23:06:00 host sshd[23172]: input_userauth_request: invalid user usr [preauth] Jan 13 23:06:00 host sshd[23172]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:06:00 host sshd[23172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.45.101.32 Jan 13 23:06:03 host sshd[23172]: Failed password for invalid user usr from 14.45.101.32 port 61416 ssh2 Jan 13 23:06:03 host sshd[23172]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:06:06 host sshd[23172]: Failed password for invalid user usr from 14.45.101.32 port 61416 ssh2 Jan 13 23:06:06 host sshd[23172]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:06:09 host sshd[23172]: Failed password for invalid user usr from 14.45.101.32 port 61416 ssh2 Jan 13 23:06:10 host sshd[23172]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:06:12 host sshd[23172]: Failed password for invalid user usr from 14.45.101.32 port 61416 ssh2 Jan 13 23:06:12 host sshd[23172]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:06:15 host sshd[23172]: Failed password for invalid user usr from 14.45.101.32 port 61416 ssh2 Jan 13 23:06:16 host sshd[23172]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:06:18 host sshd[23172]: Failed password for invalid user usr from 14.45.101.32 port 61416 ssh2 Jan 13 23:06:18 host sshd[23172]: error: maximum authentication attempts exceeded for invalid user usr from 14.45.101.32 port 61416 ssh2 [preauth] Jan 13 23:06:18 host sshd[23172]: Disconnecting: Too many authentication failures [preauth] Jan 13 23:06:18 host sshd[23172]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.45.101.32 Jan 13 23:06:18 host sshd[23172]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 13 23:06:24 host sshd[23339]: User root from 175.210.123.32 not allowed because not listed in AllowUsers Jan 13 23:06:24 host sshd[23339]: input_userauth_request: invalid user root [preauth] Jan 13 23:06:24 host unix_chkpwd[23342]: password check failed for user (root) Jan 13 23:06:24 host sshd[23339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.210.123.32 user=root Jan 13 23:06:24 host sshd[23339]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:06:27 host sshd[23339]: Failed password for invalid user root from 175.210.123.32 port 61350 ssh2 Jan 13 23:06:28 host sshd[23339]: Connection reset by 175.210.123.32 port 61350 [preauth] Jan 13 23:06:53 host sshd[23396]: Invalid user admin from 183.97.235.202 port 33003 Jan 13 23:06:53 host sshd[23396]: input_userauth_request: invalid user admin [preauth] Jan 13 23:06:53 host sshd[23396]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:06:53 host sshd[23396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.97.235.202 Jan 13 23:06:55 host sshd[23396]: Failed password for invalid user admin from 183.97.235.202 port 33003 ssh2 Jan 13 23:06:56 host sshd[23396]: Failed password for invalid user admin from 183.97.235.202 port 33003 ssh2 Jan 13 23:06:56 host sshd[23396]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:06:57 host sshd[23396]: Failed password for invalid user admin from 183.97.235.202 port 33003 ssh2 Jan 13 23:06:58 host sshd[23396]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:07:01 host sshd[23396]: Failed password for invalid user admin from 183.97.235.202 port 33003 ssh2 Jan 13 23:07:01 host sshd[23396]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:07:03 host sshd[23396]: Failed password for invalid user admin from 183.97.235.202 port 33003 ssh2 Jan 13 23:09:12 host sshd[23697]: Invalid user dmdba from 81.16.8.207 port 58906 Jan 13 23:09:12 host sshd[23697]: input_userauth_request: invalid user dmdba [preauth] Jan 13 23:09:12 host sshd[23697]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:09:12 host sshd[23697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.16.8.207 Jan 13 23:09:14 host sshd[23697]: Failed password for invalid user dmdba from 81.16.8.207 port 58906 ssh2 Jan 13 23:09:15 host sshd[23697]: Failed password for invalid user dmdba from 81.16.8.207 port 58906 ssh2 Jan 13 23:09:16 host sshd[23697]: Connection reset by 81.16.8.207 port 58906 [preauth] Jan 13 23:11:15 host sshd[23942]: Invalid user dq from 194.110.203.109 port 59608 Jan 13 23:11:15 host sshd[23942]: input_userauth_request: invalid user dq [preauth] Jan 13 23:11:15 host sshd[23942]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:11:15 host sshd[23942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 23:11:17 host sshd[23942]: Failed password for invalid user dq from 194.110.203.109 port 59608 ssh2 Jan 13 23:11:20 host sshd[23942]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:11:22 host sshd[23942]: Failed password for invalid user dq from 194.110.203.109 port 59608 ssh2 Jan 13 23:11:25 host sshd[23942]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:11:27 host sshd[23942]: Failed password for invalid user dq from 194.110.203.109 port 59608 ssh2 Jan 13 23:11:30 host sshd[23942]: Connection closed by 194.110.203.109 port 59608 [preauth] Jan 13 23:11:30 host sshd[23942]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 13 23:11:44 host sshd[24123]: Invalid user admin from 211.193.55.195 port 60476 Jan 13 23:11:44 host sshd[24123]: input_userauth_request: invalid user admin [preauth] Jan 13 23:11:44 host sshd[24123]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:11:44 host sshd[24123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.55.195 Jan 13 23:11:46 host sshd[24123]: Failed password for invalid user admin from 211.193.55.195 port 60476 ssh2 Jan 13 23:11:46 host sshd[24123]: Connection reset by 211.193.55.195 port 60476 [preauth] Jan 13 23:15:14 host sshd[24530]: Did not receive identification string from 8.219.76.192 port 61000 Jan 13 23:21:53 host sshd[25408]: User root from 141.98.11.66 not allowed because not listed in AllowUsers Jan 13 23:21:53 host sshd[25408]: input_userauth_request: invalid user root [preauth] Jan 13 23:21:53 host unix_chkpwd[25411]: password check failed for user (root) Jan 13 23:21:53 host sshd[25408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.66 user=root Jan 13 23:21:53 host sshd[25408]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:21:55 host sshd[25408]: Failed password for invalid user root from 141.98.11.66 port 58472 ssh2 Jan 13 23:21:55 host sshd[25408]: Received disconnect from 141.98.11.66 port 58472:11: Normal Shutdown, Thank you for playing [preauth] Jan 13 23:21:55 host sshd[25408]: Disconnected from 141.98.11.66 port 58472 [preauth] Jan 13 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 23:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 23:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 13 23:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwresourcehunte user-2=keralaholi user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=cochintaxi user-11=wwwkaretakers user-12=mrsclean user-13=wwwnexidigital user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 13 23:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 13 23:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 23:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KVFbFmKQr4C0iLvO.~ Jan 13 23:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KVFbFmKQr4C0iLvO.~' Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KVFbFmKQr4C0iLvO.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 13 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 13 23:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 13 23:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 13 23:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 13 23:24:05 host sshd[26005]: Invalid user hxzq from 86.163.183.125 port 33054 Jan 13 23:24:05 host sshd[26005]: input_userauth_request: invalid user hxzq [preauth] Jan 13 23:24:05 host sshd[26005]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:24:05 host sshd[26005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.163.183.125 Jan 13 23:24:07 host sshd[26005]: Failed password for invalid user hxzq from 86.163.183.125 port 33054 ssh2 Jan 13 23:24:07 host sshd[26005]: Received disconnect from 86.163.183.125 port 33054:11: Bye Bye [preauth] Jan 13 23:24:07 host sshd[26005]: Disconnected from 86.163.183.125 port 33054 [preauth] Jan 13 23:25:03 host sshd[26092]: Invalid user admin from 175.203.202.237 port 62664 Jan 13 23:25:03 host sshd[26092]: input_userauth_request: invalid user admin [preauth] Jan 13 23:25:03 host sshd[26092]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:25:03 host sshd[26092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.203.202.237 Jan 13 23:25:05 host sshd[26092]: Failed password for invalid user admin from 175.203.202.237 port 62664 ssh2 Jan 13 23:25:05 host sshd[26092]: Failed password for invalid user admin from 175.203.202.237 port 62664 ssh2 Jan 13 23:25:06 host sshd[26092]: Connection reset by 175.203.202.237 port 62664 [preauth] Jan 13 23:25:16 host sshd[26127]: Invalid user lixi from 157.230.228.27 port 34198 Jan 13 23:25:16 host sshd[26127]: input_userauth_request: invalid user lixi [preauth] Jan 13 23:25:16 host sshd[26127]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:25:16 host sshd[26127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.228.27 Jan 13 23:25:19 host sshd[26127]: Failed password for invalid user lixi from 157.230.228.27 port 34198 ssh2 Jan 13 23:25:19 host sshd[26127]: Received disconnect from 157.230.228.27 port 34198:11: Bye Bye [preauth] Jan 13 23:25:19 host sshd[26127]: Disconnected from 157.230.228.27 port 34198 [preauth] Jan 13 23:25:46 host sshd[26178]: User root from 116.118.49.107 not allowed because not listed in AllowUsers Jan 13 23:25:46 host sshd[26178]: input_userauth_request: invalid user root [preauth] Jan 13 23:25:46 host unix_chkpwd[26181]: password check failed for user (root) Jan 13 23:25:46 host sshd[26178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.118.49.107 user=root Jan 13 23:25:46 host sshd[26178]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:25:48 host sshd[26178]: Failed password for invalid user root from 116.118.49.107 port 44228 ssh2 Jan 13 23:25:49 host sshd[26178]: Received disconnect from 116.118.49.107 port 44228:11: Bye Bye [preauth] Jan 13 23:25:49 host sshd[26178]: Disconnected from 116.118.49.107 port 44228 [preauth] Jan 13 23:27:12 host sshd[26350]: User root from 220.133.28.251 not allowed because not listed in AllowUsers Jan 13 23:27:12 host sshd[26350]: input_userauth_request: invalid user root [preauth] Jan 13 23:27:12 host unix_chkpwd[26355]: password check failed for user (root) Jan 13 23:27:12 host sshd[26350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.28.251 user=root Jan 13 23:27:12 host sshd[26350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:27:13 host sshd[26350]: Failed password for invalid user root from 220.133.28.251 port 33748 ssh2 Jan 13 23:27:15 host unix_chkpwd[26359]: password check failed for user (root) Jan 13 23:27:15 host sshd[26350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:27:18 host sshd[26350]: Failed password for invalid user root from 220.133.28.251 port 33748 ssh2 Jan 13 23:27:18 host unix_chkpwd[26362]: password check failed for user (root) Jan 13 23:27:18 host sshd[26350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:27:20 host sshd[26350]: Failed password for invalid user root from 220.133.28.251 port 33748 ssh2 Jan 13 23:27:21 host sshd[26350]: Connection reset by 220.133.28.251 port 33748 [preauth] Jan 13 23:27:21 host sshd[26350]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.28.251 user=root Jan 13 23:28:44 host sshd[26587]: User root from 141.98.11.66 not allowed because not listed in AllowUsers Jan 13 23:28:44 host sshd[26587]: input_userauth_request: invalid user root [preauth] Jan 13 23:28:44 host unix_chkpwd[26591]: password check failed for user (root) Jan 13 23:28:44 host sshd[26587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.66 user=root Jan 13 23:28:44 host sshd[26587]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:28:46 host sshd[26587]: Failed password for invalid user root from 141.98.11.66 port 45532 ssh2 Jan 13 23:28:46 host sshd[26587]: Received disconnect from 141.98.11.66 port 45532:11: Normal Shutdown, Thank you for playing [preauth] Jan 13 23:28:46 host sshd[26587]: Disconnected from 141.98.11.66 port 45532 [preauth] Jan 13 23:29:23 host sshd[26801]: User root from 157.230.228.27 not allowed because not listed in AllowUsers Jan 13 23:29:23 host sshd[26801]: input_userauth_request: invalid user root [preauth] Jan 13 23:29:23 host unix_chkpwd[26804]: password check failed for user (root) Jan 13 23:29:23 host sshd[26801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.228.27 user=root Jan 13 23:29:23 host sshd[26801]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:29:26 host sshd[26801]: Failed password for invalid user root from 157.230.228.27 port 41592 ssh2 Jan 13 23:29:26 host sshd[26801]: Received disconnect from 157.230.228.27 port 41592:11: Bye Bye [preauth] Jan 13 23:29:26 host sshd[26801]: Disconnected from 157.230.228.27 port 41592 [preauth] Jan 13 23:29:33 host sshd[26864]: Invalid user agnes from 86.163.183.125 port 33467 Jan 13 23:29:33 host sshd[26864]: input_userauth_request: invalid user agnes [preauth] Jan 13 23:29:33 host sshd[26864]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:29:33 host sshd[26864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.163.183.125 Jan 13 23:29:35 host sshd[26864]: Failed password for invalid user agnes from 86.163.183.125 port 33467 ssh2 Jan 13 23:29:35 host sshd[26864]: Received disconnect from 86.163.183.125 port 33467:11: Bye Bye [preauth] Jan 13 23:29:35 host sshd[26864]: Disconnected from 86.163.183.125 port 33467 [preauth] Jan 13 23:30:33 host sshd[27015]: Invalid user roto from 116.118.49.107 port 60874 Jan 13 23:30:33 host sshd[27015]: input_userauth_request: invalid user roto [preauth] Jan 13 23:30:33 host sshd[27015]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:30:33 host sshd[27015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.118.49.107 Jan 13 23:30:35 host sshd[27015]: Failed password for invalid user roto from 116.118.49.107 port 60874 ssh2 Jan 13 23:30:35 host sshd[27015]: Received disconnect from 116.118.49.107 port 60874:11: Bye Bye [preauth] Jan 13 23:30:35 host sshd[27015]: Disconnected from 116.118.49.107 port 60874 [preauth] Jan 13 23:30:56 host sshd[27065]: User root from 86.163.183.125 not allowed because not listed in AllowUsers Jan 13 23:30:56 host sshd[27065]: input_userauth_request: invalid user root [preauth] Jan 13 23:30:56 host unix_chkpwd[27068]: password check failed for user (root) Jan 13 23:30:56 host sshd[27065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.163.183.125 user=root Jan 13 23:30:56 host sshd[27065]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:30:58 host sshd[27065]: Failed password for invalid user root from 86.163.183.125 port 47224 ssh2 Jan 13 23:32:11 host sshd[27238]: Invalid user nexidigital from 159.89.185.234 port 59492 Jan 13 23:32:11 host sshd[27238]: input_userauth_request: invalid user nexidigital [preauth] Jan 13 23:32:11 host sshd[27238]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:32:11 host sshd[27238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 13 23:32:14 host sshd[27238]: Failed password for invalid user nexidigital from 159.89.185.234 port 59492 ssh2 Jan 13 23:32:15 host sshd[27238]: Connection closed by 159.89.185.234 port 59492 [preauth] Jan 13 23:34:40 host sshd[27668]: Invalid user admin from 100.37.138.251 port 37062 Jan 13 23:34:40 host sshd[27668]: input_userauth_request: invalid user admin [preauth] Jan 13 23:34:40 host sshd[27668]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:34:40 host sshd[27668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.37.138.251 Jan 13 23:34:42 host sshd[27668]: Failed password for invalid user admin from 100.37.138.251 port 37062 ssh2 Jan 13 23:34:43 host sshd[27668]: Connection reset by 100.37.138.251 port 37062 [preauth] Jan 13 23:43:35 host sshd[28824]: User root from 92.118.39.90 not allowed because not listed in AllowUsers Jan 13 23:43:35 host sshd[28824]: input_userauth_request: invalid user root [preauth] Jan 13 23:43:35 host unix_chkpwd[28829]: password check failed for user (root) Jan 13 23:43:35 host sshd[28824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.118.39.90 user=root Jan 13 23:43:35 host sshd[28824]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 13 23:43:37 host sshd[28824]: Failed password for invalid user root from 92.118.39.90 port 57528 ssh2 Jan 13 23:43:38 host sshd[28824]: Connection closed by 92.118.39.90 port 57528 [preauth] Jan 13 23:50:25 host sshd[29884]: Invalid user Admin from 185.102.190.104 port 56157 Jan 13 23:50:25 host sshd[29884]: input_userauth_request: invalid user Admin [preauth] Jan 13 23:50:25 host sshd[29884]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:50:25 host sshd[29884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.102.190.104 Jan 13 23:50:27 host sshd[29884]: Failed password for invalid user Admin from 185.102.190.104 port 56157 ssh2 Jan 13 23:50:28 host sshd[29884]: pam_unix(sshd:auth): check pass; user unknown Jan 13 23:50:31 host sshd[29884]: Failed password for invalid user Admin from 185.102.190.104 port 56157 ssh2 Jan 13 23:50:31 host sshd[29884]: Connection reset by 185.102.190.104 port 56157 [preauth] Jan 13 23:50:31 host sshd[29884]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.102.190.104 Jan 13 23:52:21 host sshd[30071]: Connection closed by 92.246.84.108 port 40918 [preauth] Jan 14 00:05:35 host sshd[31850]: Connection reset by 211.38.210.73 port 60902 [preauth] Jan 14 00:09:09 host sshd[32366]: Invalid user ubnt from 121.133.0.160 port 63856 Jan 14 00:09:09 host sshd[32366]: input_userauth_request: invalid user ubnt [preauth] Jan 14 00:09:09 host sshd[32366]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:09:09 host sshd[32366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.133.0.160 Jan 14 00:09:12 host sshd[32366]: Failed password for invalid user ubnt from 121.133.0.160 port 63856 ssh2 Jan 14 00:09:12 host sshd[32366]: Connection reset by 121.133.0.160 port 63856 [preauth] Jan 14 00:09:14 host sshd[32379]: User root from 211.194.86.40 not allowed because not listed in AllowUsers Jan 14 00:09:14 host sshd[32379]: input_userauth_request: invalid user root [preauth] Jan 14 00:09:14 host unix_chkpwd[32384]: password check failed for user (root) Jan 14 00:09:14 host sshd[32379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.194.86.40 user=root Jan 14 00:09:14 host sshd[32379]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 00:09:17 host sshd[32379]: Failed password for invalid user root from 211.194.86.40 port 61297 ssh2 Jan 14 00:09:17 host sshd[32379]: Connection reset by 211.194.86.40 port 61297 [preauth] Jan 14 00:12:31 host sshd[377]: Connection closed by 172.105.128.12 port 52380 [preauth] Jan 14 00:12:33 host sshd[380]: Connection closed by 172.105.128.12 port 52390 [preauth] Jan 14 00:12:34 host sshd[384]: Connection closed by 172.105.128.12 port 52400 [preauth] Jan 14 00:16:20 host sshd[1832]: Invalid user service from 185.122.204.242 port 34410 Jan 14 00:16:20 host sshd[1832]: input_userauth_request: invalid user service [preauth] Jan 14 00:16:21 host sshd[1832]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:16:21 host sshd[1832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 14 00:16:23 host sshd[1832]: Failed password for invalid user service from 185.122.204.242 port 34410 ssh2 Jan 14 00:16:24 host sshd[1832]: Connection closed by 185.122.204.242 port 34410 [preauth] Jan 14 00:16:25 host sshd[1892]: Invalid user service from 185.122.204.242 port 46460 Jan 14 00:16:25 host sshd[1892]: input_userauth_request: invalid user service [preauth] Jan 14 00:16:25 host sshd[1892]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:16:25 host sshd[1892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 14 00:16:27 host sshd[1892]: Failed password for invalid user service from 185.122.204.242 port 46460 ssh2 Jan 14 00:16:27 host sshd[1892]: Connection closed by 185.122.204.242 port 46460 [preauth] Jan 14 00:16:30 host sshd[1913]: User root from 185.122.204.242 not allowed because not listed in AllowUsers Jan 14 00:16:30 host sshd[1913]: input_userauth_request: invalid user root [preauth] Jan 14 00:16:31 host unix_chkpwd[1939]: password check failed for user (root) Jan 14 00:16:31 host sshd[1913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 user=root Jan 14 00:16:31 host sshd[1913]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 00:16:33 host sshd[1913]: Failed password for invalid user root from 185.122.204.242 port 56672 ssh2 Jan 14 00:16:33 host sshd[1913]: Connection closed by 185.122.204.242 port 56672 [preauth] Jan 14 00:16:34 host sshd[1952]: Invalid user admin from 110.142.35.177 port 63505 Jan 14 00:16:34 host sshd[1952]: input_userauth_request: invalid user admin [preauth] Jan 14 00:16:34 host sshd[1952]: Failed none for invalid user admin from 110.142.35.177 port 63505 ssh2 Jan 14 00:16:34 host sshd[1952]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:16:34 host sshd[1952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.142.35.177 Jan 14 00:16:36 host sshd[1952]: Failed password for invalid user admin from 110.142.35.177 port 63505 ssh2 Jan 14 00:16:36 host sshd[1952]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:16:39 host sshd[1952]: Failed password for invalid user admin from 110.142.35.177 port 63505 ssh2 Jan 14 00:16:39 host sshd[1952]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:16:41 host sshd[1952]: Failed password for invalid user admin from 110.142.35.177 port 63505 ssh2 Jan 14 00:16:42 host sshd[1952]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:16:44 host sshd[1952]: Failed password for invalid user admin from 110.142.35.177 port 63505 ssh2 Jan 14 00:16:44 host sshd[1952]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:16:46 host sshd[1952]: Failed password for invalid user admin from 110.142.35.177 port 63505 ssh2 Jan 14 00:16:46 host sshd[1952]: error: maximum authentication attempts exceeded for invalid user admin from 110.142.35.177 port 63505 ssh2 [preauth] Jan 14 00:16:46 host sshd[1952]: Disconnecting: Too many authentication failures [preauth] Jan 14 00:16:46 host sshd[1952]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.142.35.177 Jan 14 00:16:46 host sshd[1952]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 14 00:16:46 host sshd[2022]: Connection closed by 110.142.35.177 port 63576 [preauth] Jan 14 00:21:33 host sshd[2806]: Invalid user user from 218.146.18.104 port 61046 Jan 14 00:21:33 host sshd[2806]: input_userauth_request: invalid user user [preauth] Jan 14 00:21:33 host sshd[2806]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:21:33 host sshd[2806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.146.18.104 Jan 14 00:21:35 host sshd[2806]: Failed password for invalid user user from 218.146.18.104 port 61046 ssh2 Jan 14 00:21:36 host sshd[2806]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:21:39 host sshd[2806]: Failed password for invalid user user from 218.146.18.104 port 61046 ssh2 Jan 14 00:21:39 host sshd[2806]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:21:41 host sshd[2806]: Failed password for invalid user user from 218.146.18.104 port 61046 ssh2 Jan 14 00:21:47 host sshd[2806]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:21:50 host sshd[2806]: Failed password for invalid user user from 218.146.18.104 port 61046 ssh2 Jan 14 00:21:51 host sshd[2806]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:21:53 host sshd[2806]: Failed password for invalid user user from 218.146.18.104 port 61046 ssh2 Jan 14 00:21:53 host sshd[2806]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:21:56 host sshd[2806]: Failed password for invalid user user from 218.146.18.104 port 61046 ssh2 Jan 14 00:21:56 host sshd[2806]: error: maximum authentication attempts exceeded for invalid user user from 218.146.18.104 port 61046 ssh2 [preauth] Jan 14 00:21:56 host sshd[2806]: Disconnecting: Too many authentication failures [preauth] Jan 14 00:21:56 host sshd[2806]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.146.18.104 Jan 14 00:21:56 host sshd[2806]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 14 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwresourcehunte user-2=keralaholi user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=cochintaxi user-11=wwwkaretakers user-12=wwwnexidigital user-13=mrsclean user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=wwwletsstalkfood user-19=straightcurve user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=remysagr user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 00:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wBxPxxq6Vzhgkhkd.~ Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wBxPxxq6Vzhgkhkd.~' Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wBxPxxq6Vzhgkhkd.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 00:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 00:31:03 host sshd[4401]: Did not receive identification string from 143.198.128.123 port 46560 Jan 14 00:51:50 host sshd[7426]: User root from 121.191.20.19 not allowed because not listed in AllowUsers Jan 14 00:51:50 host sshd[7426]: input_userauth_request: invalid user root [preauth] Jan 14 00:51:50 host unix_chkpwd[7433]: password check failed for user (root) Jan 14 00:51:50 host sshd[7426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.191.20.19 user=root Jan 14 00:51:50 host sshd[7426]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 00:51:52 host sshd[7426]: Failed password for invalid user root from 121.191.20.19 port 60253 ssh2 Jan 14 00:51:52 host sshd[7426]: Connection reset by 121.191.20.19 port 60253 [preauth] Jan 14 00:54:10 host sshd[7712]: Invalid user nexidigital from 159.89.185.234 port 54414 Jan 14 00:54:10 host sshd[7712]: input_userauth_request: invalid user nexidigital [preauth] Jan 14 00:54:10 host sshd[7712]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:54:10 host sshd[7712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 14 00:54:12 host sshd[7712]: Failed password for invalid user nexidigital from 159.89.185.234 port 54414 ssh2 Jan 14 00:54:13 host sshd[7712]: Connection closed by 159.89.185.234 port 54414 [preauth] Jan 14 00:55:27 host sshd[8049]: Invalid user admin from 59.126.63.210 port 43917 Jan 14 00:55:27 host sshd[8049]: input_userauth_request: invalid user admin [preauth] Jan 14 00:55:27 host sshd[8049]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:55:27 host sshd[8049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.63.210 Jan 14 00:55:29 host sshd[8049]: Failed password for invalid user admin from 59.126.63.210 port 43917 ssh2 Jan 14 00:55:30 host sshd[8049]: Failed password for invalid user admin from 59.126.63.210 port 43917 ssh2 Jan 14 00:55:30 host sshd[8049]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:55:33 host sshd[8049]: Failed password for invalid user admin from 59.126.63.210 port 43917 ssh2 Jan 14 00:55:33 host sshd[8049]: Connection reset by 59.126.63.210 port 43917 [preauth] Jan 14 00:55:33 host sshd[8049]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.63.210 Jan 14 00:59:04 host sshd[9078]: Invalid user usr from 121.150.65.207 port 60886 Jan 14 00:59:04 host sshd[9078]: input_userauth_request: invalid user usr [preauth] Jan 14 00:59:04 host sshd[9078]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:59:04 host sshd[9078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.150.65.207 Jan 14 00:59:06 host sshd[9078]: Failed password for invalid user usr from 121.150.65.207 port 60886 ssh2 Jan 14 00:59:06 host sshd[9078]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:59:08 host sshd[9078]: Failed password for invalid user usr from 121.150.65.207 port 60886 ssh2 Jan 14 00:59:09 host sshd[9078]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:59:11 host sshd[9078]: Failed password for invalid user usr from 121.150.65.207 port 60886 ssh2 Jan 14 00:59:45 host sshd[9333]: Invalid user dr from 194.110.203.109 port 50266 Jan 14 00:59:45 host sshd[9333]: input_userauth_request: invalid user dr [preauth] Jan 14 00:59:45 host sshd[9333]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:59:45 host sshd[9333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 00:59:47 host sshd[9333]: Failed password for invalid user dr from 194.110.203.109 port 50266 ssh2 Jan 14 00:59:50 host sshd[9333]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:59:52 host sshd[9333]: Failed password for invalid user dr from 194.110.203.109 port 50266 ssh2 Jan 14 00:59:55 host sshd[9333]: pam_unix(sshd:auth): check pass; user unknown Jan 14 00:59:57 host sshd[9333]: Failed password for invalid user dr from 194.110.203.109 port 50266 ssh2 Jan 14 01:00:00 host sshd[9333]: Connection closed by 194.110.203.109 port 50266 [preauth] Jan 14 01:00:00 host sshd[9333]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 01:00:51 host sshd[9720]: Invalid user gitlab-runner from 175.137.190.170 port 48295 Jan 14 01:00:51 host sshd[9720]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 14 01:00:51 host sshd[9720]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:00:51 host sshd[9720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.137.190.170 Jan 14 01:00:54 host sshd[9720]: Failed password for invalid user gitlab-runner from 175.137.190.170 port 48295 ssh2 Jan 14 01:00:54 host sshd[9720]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:00:56 host sshd[9720]: Failed password for invalid user gitlab-runner from 175.137.190.170 port 48295 ssh2 Jan 14 01:00:57 host sshd[9720]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:00:59 host sshd[9720]: Failed password for invalid user gitlab-runner from 175.137.190.170 port 48295 ssh2 Jan 14 01:00:59 host sshd[9720]: Failed password for invalid user gitlab-runner from 175.137.190.170 port 48295 ssh2 Jan 14 01:00:59 host sshd[9720]: Connection closed by 175.137.190.170 port 48295 [preauth] Jan 14 01:00:59 host sshd[9720]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.137.190.170 Jan 14 01:06:18 host sshd[11888]: Connection closed by 5.228.238.226 port 46795 [preauth] Jan 14 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=wwwkapin user-9=woodpeck user-10=palco123 user-11=gifterman user-12=kottayamcalldriv user-13=phmetals user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 01:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-era64SaJlQO4KVwz.~ Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-era64SaJlQO4KVwz.~' Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-era64SaJlQO4KVwz.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 01:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 01:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 01:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 01:25:08 host sshd[19235]: Invalid user admin from 14.45.116.152 port 63553 Jan 14 01:25:08 host sshd[19235]: input_userauth_request: invalid user admin [preauth] Jan 14 01:25:08 host sshd[19235]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:25:08 host sshd[19235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.45.116.152 Jan 14 01:25:10 host sshd[19235]: Failed password for invalid user admin from 14.45.116.152 port 63553 ssh2 Jan 14 01:25:11 host sshd[19235]: Failed password for invalid user admin from 14.45.116.152 port 63553 ssh2 Jan 14 01:25:11 host sshd[19235]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:25:14 host sshd[19235]: Failed password for invalid user admin from 14.45.116.152 port 63553 ssh2 Jan 14 01:25:15 host sshd[19235]: Connection reset by 14.45.116.152 port 63553 [preauth] Jan 14 01:25:15 host sshd[19235]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.45.116.152 Jan 14 01:30:21 host sshd[20017]: Connection reset by 122.116.135.195 port 40412 [preauth] Jan 14 01:40:04 host sshd[21545]: User root from 24.199.99.92 not allowed because not listed in AllowUsers Jan 14 01:40:04 host sshd[21545]: input_userauth_request: invalid user root [preauth] Jan 14 01:40:04 host unix_chkpwd[21550]: password check failed for user (root) Jan 14 01:40:04 host sshd[21545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.99.92 user=root Jan 14 01:40:04 host sshd[21545]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 01:40:07 host sshd[21545]: Failed password for invalid user root from 24.199.99.92 port 59632 ssh2 Jan 14 01:40:07 host sshd[21545]: Received disconnect from 24.199.99.92 port 59632:11: Bye Bye [preauth] Jan 14 01:40:07 host sshd[21545]: Disconnected from 24.199.99.92 port 59632 [preauth] Jan 14 01:40:09 host sshd[21569]: User root from 24.199.99.92 not allowed because not listed in AllowUsers Jan 14 01:40:09 host sshd[21569]: input_userauth_request: invalid user root [preauth] Jan 14 01:40:09 host unix_chkpwd[21572]: password check failed for user (root) Jan 14 01:40:09 host sshd[21569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.99.92 user=root Jan 14 01:40:09 host sshd[21569]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 01:40:11 host sshd[21569]: Failed password for invalid user root from 24.199.99.92 port 38384 ssh2 Jan 14 01:42:14 host sshd[21935]: Invalid user jlfu from 116.203.110.28 port 44264 Jan 14 01:42:14 host sshd[21935]: input_userauth_request: invalid user jlfu [preauth] Jan 14 01:42:14 host sshd[21935]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:42:14 host sshd[21935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.110.28 Jan 14 01:42:15 host sshd[21935]: Failed password for invalid user jlfu from 116.203.110.28 port 44264 ssh2 Jan 14 01:42:16 host sshd[21935]: Received disconnect from 116.203.110.28 port 44264:11: Bye Bye [preauth] Jan 14 01:42:16 host sshd[21935]: Disconnected from 116.203.110.28 port 44264 [preauth] Jan 14 01:42:24 host sshd[21958]: Invalid user an from 103.211.217.103 port 48586 Jan 14 01:42:24 host sshd[21958]: input_userauth_request: invalid user an [preauth] Jan 14 01:42:24 host sshd[21958]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:42:24 host sshd[21958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.211.217.103 Jan 14 01:42:26 host sshd[21958]: Failed password for invalid user an from 103.211.217.103 port 48586 ssh2 Jan 14 01:42:26 host sshd[21958]: Received disconnect from 103.211.217.103 port 48586:11: Bye Bye [preauth] Jan 14 01:42:26 host sshd[21958]: Disconnected from 103.211.217.103 port 48586 [preauth] Jan 14 01:43:27 host sshd[22106]: Invalid user martin from 20.141.77.82 port 37838 Jan 14 01:43:27 host sshd[22106]: input_userauth_request: invalid user martin [preauth] Jan 14 01:43:27 host sshd[22106]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:43:27 host sshd[22106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.141.77.82 Jan 14 01:43:28 host sshd[22106]: Failed password for invalid user martin from 20.141.77.82 port 37838 ssh2 Jan 14 01:43:29 host sshd[22106]: Received disconnect from 20.141.77.82 port 37838:11: Bye Bye [preauth] Jan 14 01:43:29 host sshd[22106]: Disconnected from 20.141.77.82 port 37838 [preauth] Jan 14 01:46:40 host sshd[22654]: Invalid user liangdan from 45.136.15.210 port 41826 Jan 14 01:46:40 host sshd[22654]: input_userauth_request: invalid user liangdan [preauth] Jan 14 01:46:40 host sshd[22654]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:46:40 host sshd[22654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.136.15.210 Jan 14 01:46:42 host sshd[22654]: Failed password for invalid user liangdan from 45.136.15.210 port 41826 ssh2 Jan 14 01:46:42 host sshd[22654]: Received disconnect from 45.136.15.210 port 41826:11: Bye Bye [preauth] Jan 14 01:46:42 host sshd[22654]: Disconnected from 45.136.15.210 port 41826 [preauth] Jan 14 01:47:12 host sshd[22748]: User root from 90.168.201.25 not allowed because not listed in AllowUsers Jan 14 01:47:12 host sshd[22748]: input_userauth_request: invalid user root [preauth] Jan 14 01:47:12 host unix_chkpwd[22751]: password check failed for user (root) Jan 14 01:47:12 host sshd[22748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.168.201.25 user=root Jan 14 01:47:12 host sshd[22748]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 01:47:14 host sshd[22748]: Failed password for invalid user root from 90.168.201.25 port 49536 ssh2 Jan 14 01:47:14 host sshd[22748]: Received disconnect from 90.168.201.25 port 49536:11: Bye Bye [preauth] Jan 14 01:47:14 host sshd[22748]: Disconnected from 90.168.201.25 port 49536 [preauth] Jan 14 01:47:32 host sshd[22816]: User root from 42.96.45.52 not allowed because not listed in AllowUsers Jan 14 01:47:32 host sshd[22816]: input_userauth_request: invalid user root [preauth] Jan 14 01:47:32 host unix_chkpwd[22818]: password check failed for user (root) Jan 14 01:47:32 host sshd[22816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.96.45.52 user=root Jan 14 01:47:32 host sshd[22816]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 01:47:33 host sshd[22816]: Failed password for invalid user root from 42.96.45.52 port 34611 ssh2 Jan 14 01:47:33 host sshd[22816]: Received disconnect from 42.96.45.52 port 34611:11: Bye Bye [preauth] Jan 14 01:47:33 host sshd[22816]: Disconnected from 42.96.45.52 port 34611 [preauth] Jan 14 01:48:08 host sshd[22874]: Invalid user skaner from 104.248.232.207 port 33598 Jan 14 01:48:08 host sshd[22874]: input_userauth_request: invalid user skaner [preauth] Jan 14 01:48:08 host sshd[22874]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:48:08 host sshd[22874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.232.207 Jan 14 01:48:09 host sshd[22874]: Failed password for invalid user skaner from 104.248.232.207 port 33598 ssh2 Jan 14 01:48:09 host sshd[22874]: Received disconnect from 104.248.232.207 port 33598:11: Bye Bye [preauth] Jan 14 01:48:09 host sshd[22874]: Disconnected from 104.248.232.207 port 33598 [preauth] Jan 14 01:48:40 host sshd[22934]: User root from 116.203.110.28 not allowed because not listed in AllowUsers Jan 14 01:48:40 host sshd[22934]: input_userauth_request: invalid user root [preauth] Jan 14 01:48:40 host unix_chkpwd[22938]: password check failed for user (root) Jan 14 01:48:40 host sshd[22934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.110.28 user=root Jan 14 01:48:40 host sshd[22934]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 01:48:42 host sshd[22934]: Failed password for invalid user root from 116.203.110.28 port 46206 ssh2 Jan 14 01:48:42 host sshd[22934]: Received disconnect from 116.203.110.28 port 46206:11: Bye Bye [preauth] Jan 14 01:48:42 host sshd[22934]: Disconnected from 116.203.110.28 port 46206 [preauth] Jan 14 01:48:45 host sshd[22949]: Invalid user eric from 103.211.217.103 port 39596 Jan 14 01:48:45 host sshd[22949]: input_userauth_request: invalid user eric [preauth] Jan 14 01:48:45 host sshd[22949]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:48:45 host sshd[22949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.211.217.103 Jan 14 01:48:46 host sshd[22949]: Failed password for invalid user eric from 103.211.217.103 port 39596 ssh2 Jan 14 01:48:46 host sshd[22949]: Received disconnect from 103.211.217.103 port 39596:11: Bye Bye [preauth] Jan 14 01:48:46 host sshd[22949]: Disconnected from 103.211.217.103 port 39596 [preauth] Jan 14 01:49:03 host sshd[23009]: Invalid user erp from 45.136.15.210 port 48156 Jan 14 01:49:03 host sshd[23009]: input_userauth_request: invalid user erp [preauth] Jan 14 01:49:03 host sshd[23009]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:49:03 host sshd[23009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.136.15.210 Jan 14 01:49:04 host sshd[23009]: Failed password for invalid user erp from 45.136.15.210 port 48156 ssh2 Jan 14 01:49:04 host sshd[23009]: Received disconnect from 45.136.15.210 port 48156:11: Bye Bye [preauth] Jan 14 01:49:04 host sshd[23009]: Disconnected from 45.136.15.210 port 48156 [preauth] Jan 14 01:49:07 host sshd[23015]: Invalid user Tamako from 90.168.201.25 port 52097 Jan 14 01:49:07 host sshd[23015]: input_userauth_request: invalid user Tamako [preauth] Jan 14 01:49:07 host sshd[23015]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:49:07 host sshd[23015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.168.201.25 Jan 14 01:49:09 host sshd[23015]: Failed password for invalid user Tamako from 90.168.201.25 port 52097 ssh2 Jan 14 01:49:09 host sshd[23015]: Received disconnect from 90.168.201.25 port 52097:11: Bye Bye [preauth] Jan 14 01:49:09 host sshd[23015]: Disconnected from 90.168.201.25 port 52097 [preauth] Jan 14 01:49:10 host sshd[23024]: Bad packet length 1920068850. [preauth] Jan 14 01:49:10 host sshd[23024]: ssh_dispatch_run_fatal: Connection from 125.138.44.175 port 60724: message authentication code incorrect [preauth] Jan 14 01:49:13 host sshd[23059]: Invalid user Tamako from 104.248.232.207 port 60784 Jan 14 01:49:13 host sshd[23059]: input_userauth_request: invalid user Tamako [preauth] Jan 14 01:49:13 host sshd[23059]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:49:13 host sshd[23059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.232.207 Jan 14 01:49:16 host sshd[23059]: Failed password for invalid user Tamako from 104.248.232.207 port 60784 ssh2 Jan 14 01:49:16 host sshd[23059]: Received disconnect from 104.248.232.207 port 60784:11: Bye Bye [preauth] Jan 14 01:49:16 host sshd[23059]: Disconnected from 104.248.232.207 port 60784 [preauth] Jan 14 01:49:32 host sshd[23103]: Invalid user sean from 20.141.77.82 port 36668 Jan 14 01:49:32 host sshd[23103]: input_userauth_request: invalid user sean [preauth] Jan 14 01:49:32 host sshd[23103]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:49:32 host sshd[23103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.141.77.82 Jan 14 01:49:34 host sshd[23103]: Failed password for invalid user sean from 20.141.77.82 port 36668 ssh2 Jan 14 01:49:34 host sshd[23103]: Received disconnect from 20.141.77.82 port 36668:11: Bye Bye [preauth] Jan 14 01:49:34 host sshd[23103]: Disconnected from 20.141.77.82 port 36668 [preauth] Jan 14 01:49:38 host sshd[23124]: Invalid user shifeng from 42.96.45.52 port 30862 Jan 14 01:49:38 host sshd[23124]: input_userauth_request: invalid user shifeng [preauth] Jan 14 01:49:38 host sshd[23124]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:49:38 host sshd[23124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.96.45.52 Jan 14 01:49:39 host sshd[23124]: Failed password for invalid user shifeng from 42.96.45.52 port 30862 ssh2 Jan 14 01:49:39 host sshd[23124]: Received disconnect from 42.96.45.52 port 30862:11: Bye Bye [preauth] Jan 14 01:49:39 host sshd[23124]: Disconnected from 42.96.45.52 port 30862 [preauth] Jan 14 01:49:51 host sshd[23172]: Invalid user sxd from 103.211.217.103 port 34606 Jan 14 01:49:51 host sshd[23172]: input_userauth_request: invalid user sxd [preauth] Jan 14 01:49:51 host sshd[23172]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:49:51 host sshd[23172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.211.217.103 Jan 14 01:49:52 host sshd[23172]: Failed password for invalid user sxd from 103.211.217.103 port 34606 ssh2 Jan 14 01:50:15 host sshd[23271]: Invalid user hadoop from 104.248.232.207 port 59610 Jan 14 01:50:15 host sshd[23271]: input_userauth_request: invalid user hadoop [preauth] Jan 14 01:50:15 host sshd[23271]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:50:15 host sshd[23271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.232.207 Jan 14 01:50:17 host sshd[23271]: Failed password for invalid user hadoop from 104.248.232.207 port 59610 ssh2 Jan 14 01:50:17 host sshd[23271]: Received disconnect from 104.248.232.207 port 59610:11: Bye Bye [preauth] Jan 14 01:50:17 host sshd[23271]: Disconnected from 104.248.232.207 port 59610 [preauth] Jan 14 01:50:21 host sshd[23309]: User root from 45.136.15.210 not allowed because not listed in AllowUsers Jan 14 01:50:21 host sshd[23309]: input_userauth_request: invalid user root [preauth] Jan 14 01:50:21 host unix_chkpwd[23311]: password check failed for user (root) Jan 14 01:50:21 host sshd[23309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.136.15.210 user=root Jan 14 01:50:21 host sshd[23309]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 01:50:23 host sshd[23309]: Failed password for invalid user root from 45.136.15.210 port 47296 ssh2 Jan 14 01:50:33 host sshd[23372]: Invalid user hadoop from 20.141.77.82 port 59336 Jan 14 01:50:33 host sshd[23372]: input_userauth_request: invalid user hadoop [preauth] Jan 14 01:50:33 host sshd[23372]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:50:33 host sshd[23372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.141.77.82 Jan 14 01:50:34 host sshd[23372]: Failed password for invalid user hadoop from 20.141.77.82 port 59336 ssh2 Jan 14 01:50:35 host sshd[23372]: Received disconnect from 20.141.77.82 port 59336:11: Bye Bye [preauth] Jan 14 01:50:35 host sshd[23372]: Disconnected from 20.141.77.82 port 59336 [preauth] Jan 14 01:51:06 host sshd[23450]: Connection reset by 183.107.153.42 port 60890 [preauth] Jan 14 01:55:22 host sshd[23996]: Connection reset by 121.136.32.106 port 62810 [preauth] Jan 14 01:57:50 host sshd[24307]: Invalid user vagrant from 59.126.114.190 port 56090 Jan 14 01:57:50 host sshd[24307]: input_userauth_request: invalid user vagrant [preauth] Jan 14 01:57:50 host sshd[24307]: pam_unix(sshd:auth): check pass; user unknown Jan 14 01:57:50 host sshd[24307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.114.190 Jan 14 01:57:51 host sshd[24307]: Failed password for invalid user vagrant from 59.126.114.190 port 56090 ssh2 Jan 14 01:57:52 host sshd[24307]: Failed password for invalid user vagrant from 59.126.114.190 port 56090 ssh2 Jan 14 01:57:52 host sshd[24307]: Connection closed by 59.126.114.190 port 56090 [preauth] Jan 14 01:58:09 host sshd[24390]: User root from 187.51.208.158 not allowed because not listed in AllowUsers Jan 14 01:58:09 host sshd[24390]: input_userauth_request: invalid user root [preauth] Jan 14 01:58:09 host unix_chkpwd[24422]: password check failed for user (root) Jan 14 01:58:09 host sshd[24390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.51.208.158 user=root Jan 14 01:58:09 host sshd[24390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 01:58:11 host sshd[24390]: Failed password for invalid user root from 187.51.208.158 port 50970 ssh2 Jan 14 01:58:12 host sshd[24390]: Received disconnect from 187.51.208.158 port 50970:11: Bye Bye [preauth] Jan 14 01:58:12 host sshd[24390]: Disconnected from 187.51.208.158 port 50970 [preauth] Jan 14 02:00:20 host sshd[24749]: User root from 187.51.208.158 not allowed because not listed in AllowUsers Jan 14 02:00:20 host sshd[24749]: input_userauth_request: invalid user root [preauth] Jan 14 02:00:20 host unix_chkpwd[24752]: password check failed for user (root) Jan 14 02:00:20 host sshd[24749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.51.208.158 user=root Jan 14 02:00:20 host sshd[24749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:00:23 host sshd[24749]: Failed password for invalid user root from 187.51.208.158 port 36573 ssh2 Jan 14 02:01:22 host sshd[24898]: Connection reset by 218.161.103.201 port 38698 [preauth] Jan 14 02:05:47 host sshd[25475]: User root from 211.106.167.213 not allowed because not listed in AllowUsers Jan 14 02:05:47 host sshd[25475]: input_userauth_request: invalid user root [preauth] Jan 14 02:05:47 host unix_chkpwd[25478]: password check failed for user (root) Jan 14 02:05:47 host sshd[25475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.106.167.213 user=root Jan 14 02:05:47 host sshd[25475]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:05:49 host sshd[25475]: Failed password for invalid user root from 211.106.167.213 port 63762 ssh2 Jan 14 02:05:50 host unix_chkpwd[25482]: password check failed for user (root) Jan 14 02:05:50 host sshd[25475]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:05:52 host sshd[25475]: Failed password for invalid user root from 211.106.167.213 port 63762 ssh2 Jan 14 02:05:52 host sshd[25475]: Connection reset by 211.106.167.213 port 63762 [preauth] Jan 14 02:05:52 host sshd[25475]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.106.167.213 user=root Jan 14 02:16:26 host sshd[26859]: Invalid user nexidigital from 159.89.185.234 port 49252 Jan 14 02:16:26 host sshd[26859]: input_userauth_request: invalid user nexidigital [preauth] Jan 14 02:16:26 host sshd[26859]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:16:26 host sshd[26859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 14 02:16:28 host sshd[26859]: Failed password for invalid user nexidigital from 159.89.185.234 port 49252 ssh2 Jan 14 02:16:29 host sshd[26859]: Connection closed by 159.89.185.234 port 49252 [preauth] Jan 14 02:18:28 host sshd[27082]: Invalid user ONTUSER from 1.176.194.248 port 37384 Jan 14 02:18:28 host sshd[27082]: input_userauth_request: invalid user ONTUSER [preauth] Jan 14 02:18:28 host sshd[27082]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:18:28 host sshd[27082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.176.194.248 Jan 14 02:18:30 host sshd[27082]: Failed password for invalid user ONTUSER from 1.176.194.248 port 37384 ssh2 Jan 14 02:18:31 host sshd[27082]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:18:33 host sshd[27082]: Failed password for invalid user ONTUSER from 1.176.194.248 port 37384 ssh2 Jan 14 02:18:33 host sshd[27082]: Failed password for invalid user ONTUSER from 1.176.194.248 port 37384 ssh2 Jan 14 02:18:33 host sshd[27082]: Connection closed by 1.176.194.248 port 37384 [preauth] Jan 14 02:18:33 host sshd[27082]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.176.194.248 Jan 14 02:19:44 host sshd[27264]: User root from 111.243.36.129 not allowed because not listed in AllowUsers Jan 14 02:19:44 host sshd[27264]: input_userauth_request: invalid user root [preauth] Jan 14 02:19:44 host unix_chkpwd[27270]: password check failed for user (root) Jan 14 02:19:44 host sshd[27264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.243.36.129 user=root Jan 14 02:19:44 host sshd[27264]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:19:45 host sshd[27264]: Failed password for invalid user root from 111.243.36.129 port 54994 ssh2 Jan 14 02:19:46 host unix_chkpwd[27272]: password check failed for user (root) Jan 14 02:19:46 host sshd[27264]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:19:47 host sshd[27264]: Failed password for invalid user root from 111.243.36.129 port 54994 ssh2 Jan 14 02:19:48 host unix_chkpwd[27279]: password check failed for user (root) Jan 14 02:19:48 host sshd[27264]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:19:51 host sshd[27264]: Failed password for invalid user root from 111.243.36.129 port 54994 ssh2 Jan 14 02:19:52 host sshd[27264]: Connection reset by 111.243.36.129 port 54994 [preauth] Jan 14 02:19:52 host sshd[27264]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.243.36.129 user=root Jan 14 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 02:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 02:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=kottayamcalldriv user-2=phmetals user-3=gifterman user-4=palco123 user-5=mrsclean user-6=wwwnexidigital user-7=wwwevmhonda user-8=bonifacegroup user-9=straightcurve user-10=wwwletsstalkfood user-11=wwwtestugo user-12=shalinijames user-13=vfmassets user-14=pmcresources user-15=remysagr user-16=disposeat user-17=wwwkmaorg user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 02:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b1kOrc8lHloBOnPM.~ Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b1kOrc8lHloBOnPM.~' Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b1kOrc8lHloBOnPM.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 02:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 02:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:22:10 host sshd[27627]: Connection closed by 198.199.118.95 port 51852 [preauth] Jan 14 02:29:55 host sshd[28925]: Did not receive identification string from 138.68.8.81 port 60668 Jan 14 02:29:56 host sshd[28928]: Invalid user admin from 138.68.8.81 port 60848 Jan 14 02:29:56 host sshd[28928]: input_userauth_request: invalid user admin [preauth] Jan 14 02:29:56 host sshd[28929]: Invalid user es from 138.68.8.81 port 60836 Jan 14 02:29:56 host sshd[28929]: input_userauth_request: invalid user es [preauth] Jan 14 02:29:56 host sshd[28927]: Invalid user test from 138.68.8.81 port 60842 Jan 14 02:29:56 host sshd[28930]: Invalid user oracle from 138.68.8.81 port 60840 Jan 14 02:29:56 host sshd[28927]: input_userauth_request: invalid user test [preauth] Jan 14 02:29:56 host sshd[28930]: input_userauth_request: invalid user oracle [preauth] Jan 14 02:29:56 host sshd[28932]: User root from 138.68.8.81 not allowed because not listed in AllowUsers Jan 14 02:29:56 host sshd[28932]: input_userauth_request: invalid user root [preauth] Jan 14 02:29:56 host sshd[28935]: Invalid user admin from 138.68.8.81 port 60856 Jan 14 02:29:56 host sshd[28935]: input_userauth_request: invalid user admin [preauth] Jan 14 02:29:56 host sshd[28931]: Invalid user ubuntu from 138.68.8.81 port 60846 Jan 14 02:29:56 host sshd[28931]: input_userauth_request: invalid user ubuntu [preauth] Jan 14 02:29:56 host sshd[28933]: Invalid user steam from 138.68.8.81 port 60832 Jan 14 02:29:56 host sshd[28933]: input_userauth_request: invalid user steam [preauth] Jan 14 02:29:56 host sshd[28934]: Invalid user web from 138.68.8.81 port 60844 Jan 14 02:29:56 host sshd[28934]: input_userauth_request: invalid user web [preauth] Jan 14 02:29:56 host sshd[28937]: User root from 138.68.8.81 not allowed because not listed in AllowUsers Jan 14 02:29:56 host sshd[28938]: Invalid user dev from 138.68.8.81 port 60834 Jan 14 02:29:56 host sshd[28937]: input_userauth_request: invalid user root [preauth] Jan 14 02:29:56 host sshd[28938]: input_userauth_request: invalid user dev [preauth] Jan 14 02:29:56 host sshd[28940]: User root from 138.68.8.81 not allowed because not listed in AllowUsers Jan 14 02:29:56 host sshd[28940]: input_userauth_request: invalid user root [preauth] Jan 14 02:29:56 host sshd[28942]: Invalid user admin from 138.68.8.81 port 60828 Jan 14 02:29:56 host sshd[28936]: Invalid user admin from 138.68.8.81 port 60838 Jan 14 02:29:56 host sshd[28942]: input_userauth_request: invalid user admin [preauth] Jan 14 02:29:56 host sshd[28941]: Invalid user ec2-user from 138.68.8.81 port 60868 Jan 14 02:29:56 host sshd[28936]: input_userauth_request: invalid user admin [preauth] Jan 14 02:29:56 host sshd[28941]: input_userauth_request: invalid user ec2-user [preauth] Jan 14 02:29:56 host sshd[28943]: User root from 138.68.8.81 not allowed because not listed in AllowUsers Jan 14 02:29:56 host sshd[28943]: input_userauth_request: invalid user root [preauth] Jan 14 02:29:56 host sshd[28939]: Invalid user postgres from 138.68.8.81 port 60860 Jan 14 02:29:56 host sshd[28939]: input_userauth_request: invalid user postgres [preauth] Jan 14 02:29:56 host sshd[28944]: Invalid user hadoop from 138.68.8.81 port 60870 Jan 14 02:29:56 host sshd[28944]: input_userauth_request: invalid user hadoop [preauth] Jan 14 02:29:56 host sshd[28949]: Invalid user test from 138.68.8.81 port 60830 Jan 14 02:29:56 host sshd[28949]: input_userauth_request: invalid user test [preauth] Jan 14 02:29:57 host sshd[28928]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host sshd[28929]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host sshd[28927]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host sshd[28930]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host sshd[28935]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host sshd[28931]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host sshd[28933]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host sshd[28934]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host sshd[28938]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host sshd[28936]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host sshd[28942]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host sshd[28939]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host unix_chkpwd[28966]: password check failed for user (root) Jan 14 02:29:57 host sshd[28941]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 user=root Jan 14 02:29:57 host sshd[28932]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:29:57 host sshd[28941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host unix_chkpwd[28968]: password check failed for user (root) Jan 14 02:29:57 host sshd[28940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 user=root Jan 14 02:29:57 host sshd[28940]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:29:57 host unix_chkpwd[28969]: password check failed for user (root) Jan 14 02:29:57 host sshd[28943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 user=root Jan 14 02:29:57 host sshd[28943]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:29:57 host sshd[28944]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:57 host unix_chkpwd[28967]: password check failed for user (root) Jan 14 02:29:57 host sshd[28937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 user=root Jan 14 02:29:57 host sshd[28937]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:29:57 host sshd[28949]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:29:57 host sshd[28949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.8.81 Jan 14 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=wwwpmcresource user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=pmcresources user-16=wwwkmaorg user-17=disposeat user-18=remysagr user-19=wwwkapin user-20=woodpeck user-21=kottayamcalldriv user-22=phmetals user-23=gifterman user-24=palco123 user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 02:29:58 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:29:59 host sshd[28928]: Failed password for invalid user admin from 138.68.8.81 port 60848 ssh2 Jan 14 02:29:59 host sshd[28929]: Failed password for invalid user es from 138.68.8.81 port 60836 ssh2 Jan 14 02:29:59 host sshd[28927]: Failed password for invalid user test from 138.68.8.81 port 60842 ssh2 Jan 14 02:29:59 host sshd[28930]: Failed password for invalid user oracle from 138.68.8.81 port 60840 ssh2 Jan 14 02:29:59 host sshd[28935]: Failed password for invalid user admin from 138.68.8.81 port 60856 ssh2 Jan 14 02:29:59 host sshd[28931]: Failed password for invalid user ubuntu from 138.68.8.81 port 60846 ssh2 Jan 14 02:29:59 host sshd[28933]: Failed password for invalid user steam from 138.68.8.81 port 60832 ssh2 Jan 14 02:29:59 host sshd[28934]: Failed password for invalid user web from 138.68.8.81 port 60844 ssh2 Jan 14 02:29:59 host sshd[28938]: Failed password for invalid user dev from 138.68.8.81 port 60834 ssh2 Jan 14 02:29:59 host sshd[28942]: Failed password for invalid user admin from 138.68.8.81 port 60828 ssh2 Jan 14 02:29:59 host sshd[28936]: Failed password for invalid user admin from 138.68.8.81 port 60838 ssh2 Jan 14 02:29:59 host sshd[28939]: Failed password for invalid user postgres from 138.68.8.81 port 60860 ssh2 Jan 14 02:29:59 host sshd[28941]: Failed password for invalid user ec2-user from 138.68.8.81 port 60868 ssh2 Jan 14 02:29:59 host sshd[28932]: Failed password for invalid user root from 138.68.8.81 port 60862 ssh2 Jan 14 02:29:59 host sshd[28940]: Failed password for invalid user root from 138.68.8.81 port 60866 ssh2 Jan 14 02:29:59 host sshd[28944]: Failed password for invalid user hadoop from 138.68.8.81 port 60870 ssh2 Jan 14 02:29:59 host sshd[28943]: Failed password for invalid user root from 138.68.8.81 port 60852 ssh2 Jan 14 02:29:59 host sshd[28937]: Failed password for invalid user root from 138.68.8.81 port 60850 ssh2 Jan 14 02:29:59 host sshd[28949]: Failed password for invalid user test from 138.68.8.81 port 60830 ssh2 Jan 14 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:30:25 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 14 02:30:25 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 14 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 14 02:30:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:30:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 14 02:30:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:30:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 14 02:30:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:30:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:30:45 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 14 02:30:45 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 14 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 14 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 14 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:30:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 14 02:30:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:30:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 14 02:30:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:30:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:30:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 14 02:30:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:30:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:30:55 host sshd[29341]: User root from 14.39.115.96 not allowed because not listed in AllowUsers Jan 14 02:30:55 host sshd[29341]: input_userauth_request: invalid user root [preauth] Jan 14 02:30:55 host unix_chkpwd[29348]: password check failed for user (root) Jan 14 02:30:55 host sshd[29341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.39.115.96 user=root Jan 14 02:30:55 host sshd[29341]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:30:57 host sshd[29341]: Failed password for invalid user root from 14.39.115.96 port 40952 ssh2 Jan 14 02:30:59 host unix_chkpwd[29351]: password check failed for user (root) Jan 14 02:30:59 host sshd[29341]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:31:01 host sshd[29341]: Failed password for invalid user root from 14.39.115.96 port 40952 ssh2 Jan 14 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 14 02:31:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:31:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 14 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:31:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 14 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:31:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 14 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:31:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:31:40 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 14 02:31:40 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 14 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 14 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:31:41 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 02:31:41 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 02:31:41 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:31:41 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 14 02:31:41 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 14 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 14 02:31:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:31:41 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:32:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 14 02:32:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 14 02:32:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 14 02:32:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:32:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 14 02:32:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:32:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:32:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 14 02:32:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:32:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 14 02:32:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:32:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 14 02:32:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:32:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:32:50 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 14 02:32:50 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 14 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 14 02:32:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:32:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 14 02:32:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:32:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 14 02:32:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:32:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 14 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:33:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:33:36 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 14 02:33:36 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 14 02:34:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 14 02:34:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:34:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:34:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:34:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 14 02:34:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 14 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 14 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:34:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 14 02:34:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:34:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:34:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 14 02:34:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:34:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:34:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 14 02:34:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:34:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:34:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:34:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 02:34:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 02:34:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 14 02:34:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:34:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:34:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:34:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 02:34:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 02:34:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 14 02:34:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:34:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:34:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:34:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 02:34:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 02:34:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 14 02:34:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:34:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:34:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 14 02:34:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:34:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:34:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 14 02:34:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:34:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 14 02:35:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:35:00 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 14 02:35:00 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 14 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 14 02:35:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 14 02:35:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:35:14 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 14 02:35:14 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 14 02:35:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 14 02:35:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 14 02:35:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 14 02:35:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 14 02:35:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 14 02:35:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 14 02:35:41 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 14 02:35:41 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 14 02:35:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 14 02:35:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:41 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 14 02:35:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 14 02:35:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 14 02:35:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:49 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=dartsimp WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "Anti-Malware Security and Brute-Force Firewall" on Shalini James Blog (http://www.shalinijames.com). Installed version: 4.18.71. Available version: 4.21.90.<br/><br/>2. Plugin "Responsive Lightbox & Gallery" on hype (http://testugo.in/HYPE). Installed version: 2.2.3.1. Available version: 2.4.4.<br/><br/>3. Website "Resource Hunters" (http://resourcehunters.com). Installed version: 4.2.34. Available version: 6.1.1.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Jan 14 02:35:52 host sudo: wp-toolkit : (command continued) Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 Jan 14 02:35:52 host sudo: wp-toolkit : (command continued) /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is Jan 14 02:35:52 host sudo: wp-toolkit : (command continued) down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: Jan 14 02:35:52 host sudo: wp-toolkit : (command continued) [error]FailedToExecuteWpCliCommand: chdir /home/woodpeck/public_html/wp: no such file or directory[/error]#012<br/><br/>' --output=json Jan 14 02:35:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:35:52 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:35:59 host sshd[32330]: Invalid user usr from 121.134.105.84 port 42596 Jan 14 02:35:59 host sshd[32330]: input_userauth_request: invalid user usr [preauth] Jan 14 02:35:59 host sshd[32330]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:35:59 host sshd[32330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.105.84 Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:01 host sshd[32330]: Failed password for invalid user usr from 121.134.105.84 port 42596 ssh2 Jan 14 02:36:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=dartsimp WpToolkitNotification send_admin_vulnerability_found_notification 'message=WP Toolkit has detected new vulnerabilities on WordPress sites under your care. It is strongly recommended to update or disable vulnerable assets on these sites. You can also configure WP Toolkit to perform automatic actions when vulnerabilities are detected. <table border='"'"'1'"'"' cellpadding='"'"'5'"'"' cellspacing='"'"'0'"'"'>#012 <thead bgcolor='"'"'#f4f5f7'"'"'>#012 #012 <th>Site</th>#012 <th>Vulnerability</th>#012 </thead>#012 <tbody><br/>The following vulnerabilities were found in deactivated assets and have to be addressed manually:<br/><tr>#012 #012 <td>resourcehunters.com</td>#012 <td>Wordpress ExactMetrics plugin < 7.12.1 - Contributor+ Stored XSS vulnerability</td>#012</tr></tbody>#012</table> <br/><br/>Automatic Jan 14 02:36:01 host sudo: wp-toolkit : (command continued) actions can be defined on the site autoupdate policy screen.' --output=json Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:36:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:36:02 host sshd[32330]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:36:04 host sshd[32330]: Failed password for invalid user usr from 121.134.105.84 port 42596 ssh2 Jan 14 02:36:04 host sshd[32330]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:36:07 host sshd[32330]: Failed password for invalid user usr from 121.134.105.84 port 42596 ssh2 Jan 14 02:36:07 host sshd[32330]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:36:10 host sshd[32330]: Failed password for invalid user usr from 121.134.105.84 port 42596 ssh2 Jan 14 02:36:11 host sshd[32330]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:36:13 host sshd[32330]: Failed password for invalid user usr from 121.134.105.84 port 42596 ssh2 Jan 14 02:38:22 host sshd[392]: Invalid user admin from 220.135.177.191 port 48188 Jan 14 02:38:22 host sshd[392]: input_userauth_request: invalid user admin [preauth] Jan 14 02:38:22 host sshd[392]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:38:22 host sshd[392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.177.191 Jan 14 02:38:24 host sshd[392]: Failed password for invalid user admin from 220.135.177.191 port 48188 ssh2 Jan 14 02:38:25 host sshd[392]: Connection closed by 220.135.177.191 port 48188 [preauth] Jan 14 02:39:03 host sshd[649]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 14 02:39:03 host sshd[649]: input_userauth_request: invalid user root [preauth] Jan 14 02:39:03 host unix_chkpwd[653]: password check failed for user (root) Jan 14 02:39:03 host sshd[649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 14 02:39:03 host sshd[649]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 02:39:05 host sshd[649]: Failed password for invalid user root from 194.169.175.102 port 62559 ssh2 Jan 14 02:39:05 host sshd[649]: Received disconnect from 194.169.175.102 port 62559:11: Client disconnecting normally [preauth] Jan 14 02:39:05 host sshd[649]: Disconnected from 194.169.175.102 port 62559 [preauth] Jan 14 02:41:00 host sshd[895]: Invalid user super from 175.214.113.62 port 60297 Jan 14 02:41:00 host sshd[895]: input_userauth_request: invalid user super [preauth] Jan 14 02:41:00 host sshd[895]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:41:00 host sshd[895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.214.113.62 Jan 14 02:41:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:41:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:41:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:41:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:41:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:41:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:41:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 02:41:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 02:41:02 host sshd[895]: Failed password for invalid user super from 175.214.113.62 port 60297 ssh2 Jan 14 02:41:03 host sshd[895]: Connection reset by 175.214.113.62 port 60297 [preauth] Jan 14 02:41:11 host sshd[947]: Invalid user philip from 107.189.30.59 port 59644 Jan 14 02:41:11 host sshd[947]: input_userauth_request: invalid user philip [preauth] Jan 14 02:41:11 host sshd[947]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:41:11 host sshd[947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 14 02:41:13 host sshd[947]: Failed password for invalid user philip from 107.189.30.59 port 59644 ssh2 Jan 14 02:41:14 host sshd[947]: Connection closed by 107.189.30.59 port 59644 [preauth] Jan 14 02:42:41 host sshd[1199]: Invalid user dlxuser from 113.61.241.36 port 40731 Jan 14 02:42:41 host sshd[1199]: input_userauth_request: invalid user dlxuser [preauth] Jan 14 02:42:41 host sshd[1199]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:42:41 host sshd[1199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.61.241.36 Jan 14 02:42:43 host sshd[1199]: Failed password for invalid user dlxuser from 113.61.241.36 port 40731 ssh2 Jan 14 02:42:45 host sshd[1199]: Connection reset by 113.61.241.36 port 40731 [preauth] Jan 14 02:48:26 host sshd[1992]: Invalid user ds from 194.110.203.109 port 54304 Jan 14 02:48:26 host sshd[1992]: input_userauth_request: invalid user ds [preauth] Jan 14 02:48:26 host sshd[1992]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:48:26 host sshd[1992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 02:48:28 host sshd[1992]: Failed password for invalid user ds from 194.110.203.109 port 54304 ssh2 Jan 14 02:48:31 host sshd[1992]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:48:34 host sshd[1992]: Failed password for invalid user ds from 194.110.203.109 port 54304 ssh2 Jan 14 02:48:37 host sshd[1992]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:48:40 host sshd[1992]: Failed password for invalid user ds from 194.110.203.109 port 54304 ssh2 Jan 14 02:48:43 host sshd[1992]: Connection closed by 194.110.203.109 port 54304 [preauth] Jan 14 02:48:43 host sshd[1992]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 02:53:24 host sshd[2683]: Invalid user bigipuser3 from 60.250.68.49 port 49610 Jan 14 02:53:24 host sshd[2683]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 14 02:53:24 host sshd[2683]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:53:24 host sshd[2683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.68.49 Jan 14 02:53:26 host sshd[2683]: Failed password for invalid user bigipuser3 from 60.250.68.49 port 49610 ssh2 Jan 14 02:53:26 host sshd[2683]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:53:28 host sshd[2683]: Failed password for invalid user bigipuser3 from 60.250.68.49 port 49610 ssh2 Jan 14 02:53:29 host sshd[2683]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:53:31 host sshd[2683]: Failed password for invalid user bigipuser3 from 60.250.68.49 port 49610 ssh2 Jan 14 02:53:32 host sshd[2683]: Connection reset by 60.250.68.49 port 49610 [preauth] Jan 14 02:53:32 host sshd[2683]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.68.49 Jan 14 02:56:55 host sshd[3219]: Did not receive identification string from 172.104.131.24 port 38652 Jan 14 02:57:08 host sshd[3240]: Invalid user vadmin from 125.228.35.198 port 45114 Jan 14 02:57:08 host sshd[3240]: input_userauth_request: invalid user vadmin [preauth] Jan 14 02:57:08 host sshd[3240]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:57:08 host sshd[3240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.35.198 Jan 14 02:57:10 host sshd[3240]: Failed password for invalid user vadmin from 125.228.35.198 port 45114 ssh2 Jan 14 02:57:11 host sshd[3240]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:57:13 host sshd[3240]: Failed password for invalid user vadmin from 125.228.35.198 port 45114 ssh2 Jan 14 02:57:13 host sshd[3240]: Failed password for invalid user vadmin from 125.228.35.198 port 45114 ssh2 Jan 14 02:57:14 host sshd[3240]: Connection closed by 125.228.35.198 port 45114 [preauth] Jan 14 02:57:14 host sshd[3240]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.35.198 Jan 14 02:58:44 host sshd[3449]: Invalid user sFTPUser from 221.187.25.21 port 61064 Jan 14 02:58:44 host sshd[3449]: input_userauth_request: invalid user sFTPUser [preauth] Jan 14 02:58:44 host sshd[3449]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:58:44 host sshd[3449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.187.25.21 Jan 14 02:58:45 host sshd[3449]: Failed password for invalid user sFTPUser from 221.187.25.21 port 61064 ssh2 Jan 14 02:58:46 host sshd[3449]: pam_unix(sshd:auth): check pass; user unknown Jan 14 02:58:48 host sshd[3449]: Failed password for invalid user sFTPUser from 221.187.25.21 port 61064 ssh2 Jan 14 03:12:29 host sshd[5390]: User root from 92.91.158.118 not allowed because not listed in AllowUsers Jan 14 03:12:29 host sshd[5390]: input_userauth_request: invalid user root [preauth] Jan 14 03:12:29 host unix_chkpwd[5393]: password check failed for user (root) Jan 14 03:12:29 host sshd[5390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.91.158.118 user=root Jan 14 03:12:29 host sshd[5390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:12:31 host sshd[5390]: Failed password for invalid user root from 92.91.158.118 port 46671 ssh2 Jan 14 03:12:31 host unix_chkpwd[5396]: password check failed for user (root) Jan 14 03:12:31 host sshd[5390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:12:34 host sshd[5390]: Failed password for invalid user root from 92.91.158.118 port 46671 ssh2 Jan 14 03:12:35 host unix_chkpwd[5400]: password check failed for user (root) Jan 14 03:12:35 host sshd[5390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:12:37 host sshd[5390]: Failed password for invalid user root from 92.91.158.118 port 46671 ssh2 Jan 14 03:12:38 host unix_chkpwd[5403]: password check failed for user (root) Jan 14 03:12:38 host sshd[5390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:12:40 host sshd[5390]: Failed password for invalid user root from 92.91.158.118 port 46671 ssh2 Jan 14 03:21:39 host sshd[6632]: Connection reset by 114.35.8.191 port 39704 [preauth] Jan 14 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=gifterman user-13=palco123 user-14=kottayamcalldriv user-15=phmetals user-16=straightcurve user-17=wwwletsstalkfood user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=cochintaxi user-24=wwwkaretakers user-25=wwwrmswll user-26=keralaholi user-27=wwwresourcehunte user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 03:22:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2yrcEnacUZRWRzc3.~ Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2yrcEnacUZRWRzc3.~' Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2yrcEnacUZRWRzc3.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 03:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 03:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 03:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 03:23:00 host sshd[7088]: User root from 122.121.69.22 not allowed because not listed in AllowUsers Jan 14 03:23:00 host sshd[7088]: input_userauth_request: invalid user root [preauth] Jan 14 03:23:00 host unix_chkpwd[7095]: password check failed for user (root) Jan 14 03:23:00 host sshd[7088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.121.69.22 user=root Jan 14 03:23:00 host sshd[7088]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:23:02 host sshd[7088]: Failed password for invalid user root from 122.121.69.22 port 43718 ssh2 Jan 14 03:23:05 host unix_chkpwd[7151]: password check failed for user (root) Jan 14 03:23:05 host sshd[7088]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:23:07 host sshd[7149]: Invalid user postgres from 121.137.208.249 port 61979 Jan 14 03:23:07 host sshd[7149]: input_userauth_request: invalid user postgres [preauth] Jan 14 03:23:07 host sshd[7149]: pam_unix(sshd:auth): check pass; user unknown Jan 14 03:23:07 host sshd[7149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.137.208.249 Jan 14 03:23:07 host sshd[7088]: Failed password for invalid user root from 122.121.69.22 port 43718 ssh2 Jan 14 03:23:07 host sshd[7088]: Connection reset by 122.121.69.22 port 43718 [preauth] Jan 14 03:23:07 host sshd[7088]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.121.69.22 user=root Jan 14 03:23:08 host sshd[7149]: Failed password for invalid user postgres from 121.137.208.249 port 61979 ssh2 Jan 14 03:23:09 host sshd[7149]: Connection reset by 121.137.208.249 port 61979 [preauth] Jan 14 03:26:47 host sshd[7507]: Connection reset by 59.4.17.99 port 47594 [preauth] Jan 14 03:32:05 host sshd[8282]: Did not receive identification string from 87.236.176.24 port 50631 Jan 14 03:32:06 host sshd[8287]: Connection closed by 87.236.176.24 port 47193 [preauth] Jan 14 03:32:21 host sshd[8315]: Invalid user admin from 114.35.47.93 port 47494 Jan 14 03:32:21 host sshd[8315]: input_userauth_request: invalid user admin [preauth] Jan 14 03:32:21 host sshd[8315]: pam_unix(sshd:auth): check pass; user unknown Jan 14 03:32:21 host sshd[8315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.47.93 Jan 14 03:32:23 host sshd[8315]: Failed password for invalid user admin from 114.35.47.93 port 47494 ssh2 Jan 14 03:32:24 host sshd[8315]: Failed password for invalid user admin from 114.35.47.93 port 47494 ssh2 Jan 14 03:32:25 host sshd[8315]: pam_unix(sshd:auth): check pass; user unknown Jan 14 03:32:27 host sshd[8315]: Failed password for invalid user admin from 114.35.47.93 port 47494 ssh2 Jan 14 03:32:28 host sshd[8315]: Connection reset by 114.35.47.93 port 47494 [preauth] Jan 14 03:32:28 host sshd[8315]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.47.93 Jan 14 03:36:39 host sshd[8947]: User root from 182.155.41.10 not allowed because not listed in AllowUsers Jan 14 03:36:39 host sshd[8947]: input_userauth_request: invalid user root [preauth] Jan 14 03:36:39 host unix_chkpwd[8952]: password check failed for user (root) Jan 14 03:36:39 host sshd[8947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.155.41.10 user=root Jan 14 03:36:39 host sshd[8947]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:36:41 host sshd[8947]: Failed password for invalid user root from 182.155.41.10 port 43401 ssh2 Jan 14 03:36:42 host sshd[8947]: Connection reset by 182.155.41.10 port 43401 [preauth] Jan 14 03:37:56 host sshd[9095]: Invalid user nexidigital from 159.89.185.234 port 44026 Jan 14 03:37:56 host sshd[9095]: input_userauth_request: invalid user nexidigital [preauth] Jan 14 03:37:56 host sshd[9095]: pam_unix(sshd:auth): check pass; user unknown Jan 14 03:37:56 host sshd[9095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 14 03:37:58 host sshd[9095]: Failed password for invalid user nexidigital from 159.89.185.234 port 44026 ssh2 Jan 14 03:37:59 host sshd[9095]: Connection closed by 159.89.185.234 port 44026 [preauth] Jan 14 03:38:35 host sshd[9179]: User root from 85.44.37.171 not allowed because not listed in AllowUsers Jan 14 03:38:35 host sshd[9179]: input_userauth_request: invalid user root [preauth] Jan 14 03:38:35 host unix_chkpwd[9183]: password check failed for user (root) Jan 14 03:38:35 host sshd[9179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.44.37.171 user=root Jan 14 03:38:35 host sshd[9179]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:38:38 host sshd[9179]: Failed password for invalid user root from 85.44.37.171 port 33592 ssh2 Jan 14 03:38:38 host sshd[9179]: Connection reset by 85.44.37.171 port 33592 [preauth] Jan 14 03:38:46 host sshd[9193]: User root from 114.32.235.192 not allowed because not listed in AllowUsers Jan 14 03:38:46 host sshd[9193]: input_userauth_request: invalid user root [preauth] Jan 14 03:38:46 host unix_chkpwd[9199]: password check failed for user (root) Jan 14 03:38:46 host sshd[9193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.235.192 user=root Jan 14 03:38:46 host sshd[9193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:38:48 host sshd[9193]: Failed password for invalid user root from 114.32.235.192 port 50758 ssh2 Jan 14 03:38:49 host unix_chkpwd[9268]: password check failed for user (root) Jan 14 03:38:49 host sshd[9193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:38:50 host sshd[9193]: Failed password for invalid user root from 114.32.235.192 port 50758 ssh2 Jan 14 03:38:51 host unix_chkpwd[9305]: password check failed for user (root) Jan 14 03:38:51 host sshd[9193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:38:53 host sshd[9193]: Failed password for invalid user root from 114.32.235.192 port 50758 ssh2 Jan 14 03:38:53 host unix_chkpwd[9319]: password check failed for user (root) Jan 14 03:38:53 host sshd[9193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 03:38:56 host sshd[9193]: Failed password for invalid user root from 114.32.235.192 port 50758 ssh2 Jan 14 03:41:27 host sshd[9636]: Invalid user admin from 221.155.125.6 port 62117 Jan 14 03:41:27 host sshd[9636]: input_userauth_request: invalid user admin [preauth] Jan 14 03:41:27 host sshd[9636]: pam_unix(sshd:auth): check pass; user unknown Jan 14 03:41:27 host sshd[9636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.155.125.6 Jan 14 03:41:28 host sshd[9636]: Failed password for invalid user admin from 221.155.125.6 port 62117 ssh2 Jan 14 03:41:29 host sshd[9636]: Failed password for invalid user admin from 221.155.125.6 port 62117 ssh2 Jan 14 03:41:32 host sshd[9636]: pam_unix(sshd:auth): check pass; user unknown Jan 14 03:41:34 host sshd[9636]: Failed password for invalid user admin from 221.155.125.6 port 62117 ssh2 Jan 14 03:41:35 host sshd[9636]: pam_unix(sshd:auth): check pass; user unknown Jan 14 03:41:37 host sshd[9636]: Failed password for invalid user admin from 221.155.125.6 port 62117 ssh2 Jan 14 03:41:39 host sshd[9636]: pam_unix(sshd:auth): check pass; user unknown Jan 14 03:41:40 host sshd[9636]: Failed password for invalid user admin from 221.155.125.6 port 62117 ssh2 Jan 14 03:41:41 host sshd[9636]: Connection reset by 221.155.125.6 port 62117 [preauth] Jan 14 03:41:41 host sshd[9636]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.155.125.6 Jan 14 03:41:41 host sshd[9636]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 14 03:42:52 host sshd[9833]: Connection reset by 211.23.116.39 port 34605 [preauth] Jan 14 03:48:27 host sshd[10592]: Did not receive identification string from 46.101.97.107 port 61000 Jan 14 03:49:02 host sshd[10640]: Connection reset by 184.22.244.138 port 39273 [preauth] Jan 14 03:52:51 host sshd[11200]: Invalid user gitlab-runner from 220.133.218.195 port 56738 Jan 14 03:52:51 host sshd[11200]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 14 03:52:51 host sshd[11200]: pam_unix(sshd:auth): check pass; user unknown Jan 14 03:52:51 host sshd[11200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.218.195 Jan 14 03:52:53 host sshd[11200]: Failed password for invalid user gitlab-runner from 220.133.218.195 port 56738 ssh2 Jan 14 03:52:53 host sshd[11200]: pam_unix(sshd:auth): check pass; user unknown Jan 14 03:52:56 host sshd[11200]: Failed password for invalid user gitlab-runner from 220.133.218.195 port 56738 ssh2 Jan 14 03:52:56 host sshd[11200]: Connection reset by 220.133.218.195 port 56738 [preauth] Jan 14 03:52:56 host sshd[11200]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.218.195 Jan 14 04:03:17 host sshd[12582]: Invalid user admin from 210.126.26.33 port 52820 Jan 14 04:03:17 host sshd[12582]: input_userauth_request: invalid user admin [preauth] Jan 14 04:03:17 host sshd[12582]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:03:17 host sshd[12582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.126.26.33 Jan 14 04:03:19 host sshd[12582]: Failed password for invalid user admin from 210.126.26.33 port 52820 ssh2 Jan 14 04:03:19 host sshd[12582]: Connection closed by 210.126.26.33 port 52820 [preauth] Jan 14 04:10:33 host sshd[13500]: User root from 61.61.75.166 not allowed because not listed in AllowUsers Jan 14 04:10:33 host sshd[13500]: input_userauth_request: invalid user root [preauth] Jan 14 04:10:33 host unix_chkpwd[13506]: password check failed for user (root) Jan 14 04:10:33 host sshd[13500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.61.75.166 user=root Jan 14 04:10:33 host sshd[13500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 04:10:35 host sshd[13500]: Failed password for invalid user root from 61.61.75.166 port 51524 ssh2 Jan 14 04:10:36 host unix_chkpwd[13513]: password check failed for user (root) Jan 14 04:10:36 host sshd[13500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 04:10:38 host sshd[13500]: Failed password for invalid user root from 61.61.75.166 port 51524 ssh2 Jan 14 04:10:38 host unix_chkpwd[13516]: password check failed for user (root) Jan 14 04:10:38 host sshd[13500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 04:10:40 host sshd[13500]: Failed password for invalid user root from 61.61.75.166 port 51524 ssh2 Jan 14 04:10:41 host unix_chkpwd[13520]: password check failed for user (root) Jan 14 04:10:41 host sshd[13500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 04:10:43 host sshd[13500]: Failed password for invalid user root from 61.61.75.166 port 51524 ssh2 Jan 14 04:17:51 host sshd[14817]: Invalid user user from 221.157.140.133 port 60325 Jan 14 04:17:51 host sshd[14817]: input_userauth_request: invalid user user [preauth] Jan 14 04:17:51 host sshd[14817]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:17:51 host sshd[14817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.157.140.133 Jan 14 04:17:53 host sshd[14817]: Failed password for invalid user user from 221.157.140.133 port 60325 ssh2 Jan 14 04:17:54 host sshd[14817]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:17:56 host sshd[14817]: Failed password for invalid user user from 221.157.140.133 port 60325 ssh2 Jan 14 04:17:57 host sshd[14817]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:17:59 host sshd[14817]: Failed password for invalid user user from 221.157.140.133 port 60325 ssh2 Jan 14 04:17:59 host sshd[14817]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:18:02 host sshd[14817]: Failed password for invalid user user from 221.157.140.133 port 60325 ssh2 Jan 14 04:18:03 host sshd[14817]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:18:04 host sshd[14817]: Failed password for invalid user user from 221.157.140.133 port 60325 ssh2 Jan 14 04:18:05 host sshd[14817]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:18:07 host sshd[14817]: Failed password for invalid user user from 221.157.140.133 port 60325 ssh2 Jan 14 04:18:07 host sshd[14817]: error: maximum authentication attempts exceeded for invalid user user from 221.157.140.133 port 60325 ssh2 [preauth] Jan 14 04:18:07 host sshd[14817]: Disconnecting: Too many authentication failures [preauth] Jan 14 04:18:07 host sshd[14817]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.157.140.133 Jan 14 04:18:07 host sshd[14817]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 14 04:19:42 host sshd[15089]: Invalid user oracle from 116.241.56.122 port 44244 Jan 14 04:19:42 host sshd[15089]: input_userauth_request: invalid user oracle [preauth] Jan 14 04:19:42 host sshd[15089]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:19:42 host sshd[15089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.241.56.122 Jan 14 04:19:44 host sshd[15089]: Failed password for invalid user oracle from 116.241.56.122 port 44244 ssh2 Jan 14 04:19:44 host sshd[15089]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:19:46 host sshd[15089]: Failed password for invalid user oracle from 116.241.56.122 port 44244 ssh2 Jan 14 04:19:46 host sshd[15089]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:19:48 host sshd[15089]: Failed password for invalid user oracle from 116.241.56.122 port 44244 ssh2 Jan 14 04:19:48 host sshd[15089]: Failed password for invalid user oracle from 116.241.56.122 port 44244 ssh2 Jan 14 04:19:49 host sshd[15089]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:19:50 host sshd[15089]: Failed password for invalid user oracle from 116.241.56.122 port 44244 ssh2 Jan 14 04:19:50 host sshd[15089]: Connection reset by 116.241.56.122 port 44244 [preauth] Jan 14 04:19:50 host sshd[15089]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.241.56.122 Jan 14 04:19:50 host sshd[15089]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 14 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=kottayamcalldriv user-4=phmetals user-5=palco123 user-6=gifterman user-7=straightcurve user-8=wwwletsstalkfood user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=wwwkapin user-16=woodpeck user-17=wwwkmaorg user-18=disposeat user-19=remysagr user-20=ugotscom user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 04:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 04:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UAbCDhNlnRsHcwxO.~ Jan 14 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UAbCDhNlnRsHcwxO.~' Jan 14 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UAbCDhNlnRsHcwxO.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 04:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 04:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 04:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 04:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 04:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 04:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 04:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 04:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 04:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 04:29:09 host sshd[16718]: Invalid user vagrant from 61.227.162.43 port 36979 Jan 14 04:29:09 host sshd[16718]: input_userauth_request: invalid user vagrant [preauth] Jan 14 04:29:09 host sshd[16718]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:29:09 host sshd[16718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.227.162.43 Jan 14 04:29:11 host sshd[16718]: Failed password for invalid user vagrant from 61.227.162.43 port 36979 ssh2 Jan 14 04:29:12 host sshd[16718]: Failed password for invalid user vagrant from 61.227.162.43 port 36979 ssh2 Jan 14 04:29:12 host sshd[16718]: Connection closed by 61.227.162.43 port 36979 [preauth] Jan 14 04:29:16 host sshd[16733]: Invalid user gdm from 104.244.74.6 port 38676 Jan 14 04:29:16 host sshd[16733]: input_userauth_request: invalid user gdm [preauth] Jan 14 04:29:16 host sshd[16733]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:29:16 host sshd[16733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 14 04:29:19 host sshd[16733]: Failed password for invalid user gdm from 104.244.74.6 port 38676 ssh2 Jan 14 04:29:19 host sshd[16733]: Connection closed by 104.244.74.6 port 38676 [preauth] Jan 14 04:33:19 host sshd[17286]: Invalid user gdm from 104.244.74.6 port 52244 Jan 14 04:33:19 host sshd[17286]: input_userauth_request: invalid user gdm [preauth] Jan 14 04:33:19 host sshd[17286]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:33:19 host sshd[17286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 14 04:33:21 host sshd[17286]: Failed password for invalid user gdm from 104.244.74.6 port 52244 ssh2 Jan 14 04:33:21 host sshd[17286]: Connection closed by 104.244.74.6 port 52244 [preauth] Jan 14 04:35:10 host sshd[17491]: Invalid user dt from 194.110.203.109 port 50716 Jan 14 04:35:10 host sshd[17491]: input_userauth_request: invalid user dt [preauth] Jan 14 04:35:10 host sshd[17491]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:35:10 host sshd[17491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 04:35:12 host sshd[17491]: Failed password for invalid user dt from 194.110.203.109 port 50716 ssh2 Jan 14 04:35:15 host sshd[17491]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:35:16 host sshd[17491]: Failed password for invalid user dt from 194.110.203.109 port 50716 ssh2 Jan 14 04:35:20 host sshd[17491]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:35:22 host sshd[17491]: Failed password for invalid user dt from 194.110.203.109 port 50716 ssh2 Jan 14 04:35:25 host sshd[17491]: Connection closed by 194.110.203.109 port 50716 [preauth] Jan 14 04:35:25 host sshd[17491]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 04:35:27 host sshd[17635]: Invalid user pi from 220.133.66.161 port 33899 Jan 14 04:35:27 host sshd[17635]: input_userauth_request: invalid user pi [preauth] Jan 14 04:35:27 host sshd[17635]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:35:27 host sshd[17635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.66.161 Jan 14 04:35:29 host sshd[17635]: Failed password for invalid user pi from 220.133.66.161 port 33899 ssh2 Jan 14 04:35:30 host sshd[17635]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:35:32 host sshd[17635]: Failed password for invalid user pi from 220.133.66.161 port 33899 ssh2 Jan 14 04:35:33 host sshd[17635]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:35:35 host sshd[17635]: Failed password for invalid user pi from 220.133.66.161 port 33899 ssh2 Jan 14 04:35:36 host sshd[17635]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:35:38 host sshd[17635]: Failed password for invalid user pi from 220.133.66.161 port 33899 ssh2 Jan 14 04:35:39 host sshd[17635]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:35:41 host sshd[17635]: Failed password for invalid user pi from 220.133.66.161 port 33899 ssh2 Jan 14 04:35:41 host sshd[17635]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:35:43 host sshd[17635]: Failed password for invalid user pi from 220.133.66.161 port 33899 ssh2 Jan 14 04:35:43 host sshd[17635]: error: maximum authentication attempts exceeded for invalid user pi from 220.133.66.161 port 33899 ssh2 [preauth] Jan 14 04:35:43 host sshd[17635]: Disconnecting: Too many authentication failures [preauth] Jan 14 04:35:43 host sshd[17635]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.66.161 Jan 14 04:35:43 host sshd[17635]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 14 04:45:29 host sshd[19103]: Invalid user user from 114.33.213.154 port 52530 Jan 14 04:45:29 host sshd[19103]: input_userauth_request: invalid user user [preauth] Jan 14 04:45:29 host sshd[19103]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:45:29 host sshd[19103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.213.154 Jan 14 04:45:32 host sshd[19103]: Failed password for invalid user user from 114.33.213.154 port 52530 ssh2 Jan 14 04:45:32 host sshd[19103]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:45:34 host sshd[19103]: Failed password for invalid user user from 114.33.213.154 port 52530 ssh2 Jan 14 04:45:35 host sshd[19103]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:45:37 host sshd[19103]: Failed password for invalid user user from 114.33.213.154 port 52530 ssh2 Jan 14 04:45:38 host sshd[19103]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:45:39 host sshd[19103]: Failed password for invalid user user from 114.33.213.154 port 52530 ssh2 Jan 14 04:45:41 host sshd[19103]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:45:43 host sshd[19103]: Failed password for invalid user user from 114.33.213.154 port 52530 ssh2 Jan 14 04:47:02 host sshd[19408]: Invalid user admin from 121.151.0.213 port 60867 Jan 14 04:47:02 host sshd[19408]: input_userauth_request: invalid user admin [preauth] Jan 14 04:47:02 host sshd[19408]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:47:02 host sshd[19408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.151.0.213 Jan 14 04:47:04 host sshd[19408]: Failed password for invalid user admin from 121.151.0.213 port 60867 ssh2 Jan 14 04:47:04 host sshd[19408]: Connection reset by 121.151.0.213 port 60867 [preauth] Jan 14 04:48:21 host sshd[19540]: Connection reset by 121.146.113.247 port 40633 [preauth] Jan 14 04:48:23 host sshd[19549]: Invalid user openhabian from 195.226.194.142 port 55336 Jan 14 04:48:23 host sshd[19549]: input_userauth_request: invalid user openhabian [preauth] Jan 14 04:48:23 host sshd[19549]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:48:23 host sshd[19549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 14 04:48:23 host sshd[19543]: Invalid user admin from 41.39.137.68 port 49953 Jan 14 04:48:23 host sshd[19543]: input_userauth_request: invalid user admin [preauth] Jan 14 04:48:23 host sshd[19543]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:48:23 host sshd[19543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.39.137.68 Jan 14 04:48:25 host sshd[19549]: Failed password for invalid user openhabian from 195.226.194.142 port 55336 ssh2 Jan 14 04:48:25 host sshd[19549]: Received disconnect from 195.226.194.142 port 55336:11: Bye Bye [preauth] Jan 14 04:48:25 host sshd[19549]: Disconnected from 195.226.194.142 port 55336 [preauth] Jan 14 04:48:25 host sshd[19543]: Failed password for invalid user admin from 41.39.137.68 port 49953 ssh2 Jan 14 04:48:26 host sshd[19543]: Failed password for invalid user admin from 41.39.137.68 port 49953 ssh2 Jan 14 04:48:26 host sshd[19543]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:48:29 host sshd[19543]: Failed password for invalid user admin from 41.39.137.68 port 49953 ssh2 Jan 14 04:48:30 host sshd[19543]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:48:32 host sshd[19543]: Failed password for invalid user admin from 41.39.137.68 port 49953 ssh2 Jan 14 04:48:33 host sshd[19543]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:48:36 host sshd[19543]: Failed password for invalid user admin from 41.39.137.68 port 49953 ssh2 Jan 14 04:54:19 host sshd[20398]: User root from 125.133.184.60 not allowed because not listed in AllowUsers Jan 14 04:54:19 host sshd[20398]: input_userauth_request: invalid user root [preauth] Jan 14 04:54:19 host unix_chkpwd[20401]: password check failed for user (root) Jan 14 04:54:19 host sshd[20398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.133.184.60 user=root Jan 14 04:54:19 host sshd[20398]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 04:54:21 host sshd[20398]: Failed password for invalid user root from 125.133.184.60 port 60109 ssh2 Jan 14 04:54:22 host unix_chkpwd[20406]: password check failed for user (root) Jan 14 04:54:22 host sshd[20398]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 04:54:23 host sshd[20398]: Failed password for invalid user root from 125.133.184.60 port 60109 ssh2 Jan 14 04:54:24 host unix_chkpwd[20409]: password check failed for user (root) Jan 14 04:54:24 host sshd[20398]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 04:54:26 host sshd[20398]: Failed password for invalid user root from 125.133.184.60 port 60109 ssh2 Jan 14 04:54:26 host unix_chkpwd[20413]: password check failed for user (root) Jan 14 04:54:26 host sshd[20398]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 04:54:28 host sshd[20398]: Failed password for invalid user root from 125.133.184.60 port 60109 ssh2 Jan 14 04:55:51 host sshd[20606]: Invalid user zyfwp from 24.73.236.54 port 63247 Jan 14 04:55:51 host sshd[20606]: input_userauth_request: invalid user zyfwp [preauth] Jan 14 04:55:51 host sshd[20606]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:55:51 host sshd[20606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.73.236.54 Jan 14 04:55:54 host sshd[20606]: Failed password for invalid user zyfwp from 24.73.236.54 port 63247 ssh2 Jan 14 04:55:55 host sshd[20606]: Connection reset by 24.73.236.54 port 63247 [preauth] Jan 14 04:59:09 host sshd[21117]: Invalid user nexidigital from 159.89.185.234 port 38706 Jan 14 04:59:09 host sshd[21117]: input_userauth_request: invalid user nexidigital [preauth] Jan 14 04:59:09 host sshd[21117]: pam_unix(sshd:auth): check pass; user unknown Jan 14 04:59:09 host sshd[21117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 14 04:59:11 host sshd[21117]: Failed password for invalid user nexidigital from 159.89.185.234 port 38706 ssh2 Jan 14 04:59:15 host sshd[21117]: Connection closed by 159.89.185.234 port 38706 [preauth] Jan 14 05:01:52 host sshd[21441]: User ftp from 125.143.82.148 not allowed because not listed in AllowUsers Jan 14 05:01:52 host sshd[21441]: input_userauth_request: invalid user ftp [preauth] Jan 14 05:01:52 host unix_chkpwd[21445]: password check failed for user (ftp) Jan 14 05:01:52 host sshd[21441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.143.82.148 user=ftp Jan 14 05:01:52 host sshd[21441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 14 05:01:54 host sshd[21441]: Failed password for invalid user ftp from 125.143.82.148 port 61477 ssh2 Jan 14 05:01:54 host unix_chkpwd[21449]: password check failed for user (ftp) Jan 14 05:01:54 host sshd[21441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 14 05:01:56 host sshd[21441]: Failed password for invalid user ftp from 125.143.82.148 port 61477 ssh2 Jan 14 05:01:56 host sshd[21441]: Connection reset by 125.143.82.148 port 61477 [preauth] Jan 14 05:01:56 host sshd[21441]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.143.82.148 user=ftp Jan 14 05:03:22 host sshd[21687]: Invalid user gdm from 104.244.74.6 port 57078 Jan 14 05:03:22 host sshd[21687]: input_userauth_request: invalid user gdm [preauth] Jan 14 05:03:22 host sshd[21687]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:03:22 host sshd[21687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 14 05:03:24 host sshd[21687]: Failed password for invalid user gdm from 104.244.74.6 port 57078 ssh2 Jan 14 05:08:10 host sshd[22350]: Invalid user vipin@ugotechnologies.com from 95.185.176.107 port 2610 Jan 14 05:08:10 host sshd[22350]: input_userauth_request: invalid user vipin@ugotechnologies.com [preauth] Jan 14 05:08:10 host sshd[22350]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:08:10 host sshd[22350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.185.176.107 Jan 14 05:08:12 host sshd[22350]: Failed password for invalid user vipin@ugotechnologies.com from 95.185.176.107 port 2610 ssh2 Jan 14 05:08:13 host sshd[22350]: Connection closed by 95.185.176.107 port 2610 [preauth] Jan 14 05:08:14 host sshd[22363]: User root from 95.185.176.107 not allowed because not listed in AllowUsers Jan 14 05:08:14 host sshd[22363]: input_userauth_request: invalid user root [preauth] Jan 14 05:08:14 host unix_chkpwd[22371]: password check failed for user (root) Jan 14 05:08:14 host sshd[22363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.185.176.107 user=root Jan 14 05:08:14 host sshd[22363]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:08:16 host sshd[22363]: Failed password for invalid user root from 95.185.176.107 port 1683 ssh2 Jan 14 05:08:16 host sshd[22363]: Connection closed by 95.185.176.107 port 1683 [preauth] Jan 14 05:18:16 host sshd[23830]: Invalid user service from 80.68.7.179 port 49744 Jan 14 05:18:16 host sshd[23830]: input_userauth_request: invalid user service [preauth] Jan 14 05:18:16 host sshd[23830]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:18:16 host sshd[23830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.179 Jan 14 05:18:17 host sshd[23830]: Failed password for invalid user service from 80.68.7.179 port 49744 ssh2 Jan 14 05:18:18 host sshd[23830]: Received disconnect from 80.68.7.179 port 49744:11: Bye Bye [preauth] Jan 14 05:18:18 host sshd[23830]: Disconnected from 80.68.7.179 port 49744 [preauth] Jan 14 05:18:36 host sshd[23875]: User root from 188.170.13.225 not allowed because not listed in AllowUsers Jan 14 05:18:36 host sshd[23875]: input_userauth_request: invalid user root [preauth] Jan 14 05:18:36 host unix_chkpwd[23877]: password check failed for user (root) Jan 14 05:18:36 host sshd[23875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.13.225 user=root Jan 14 05:18:36 host sshd[23875]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:18:38 host sshd[23875]: Failed password for invalid user root from 188.170.13.225 port 50108 ssh2 Jan 14 05:18:38 host sshd[23875]: Received disconnect from 188.170.13.225 port 50108:11: Bye Bye [preauth] Jan 14 05:18:38 host sshd[23875]: Disconnected from 188.170.13.225 port 50108 [preauth] Jan 14 05:18:52 host sshd[23894]: Invalid user test2 from 195.226.194.142 port 38906 Jan 14 05:18:52 host sshd[23894]: input_userauth_request: invalid user test2 [preauth] Jan 14 05:18:52 host sshd[23894]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:18:52 host sshd[23894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 14 05:18:54 host sshd[23894]: Failed password for invalid user test2 from 195.226.194.142 port 38906 ssh2 Jan 14 05:18:54 host sshd[23894]: Received disconnect from 195.226.194.142 port 38906:11: Bye Bye [preauth] Jan 14 05:18:54 host sshd[23894]: Disconnected from 195.226.194.142 port 38906 [preauth] Jan 14 05:20:12 host sshd[24049]: Invalid user liuhao from 190.120.254.76 port 43313 Jan 14 05:20:12 host sshd[24049]: input_userauth_request: invalid user liuhao [preauth] Jan 14 05:20:12 host sshd[24049]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:20:12 host sshd[24049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.120.254.76 Jan 14 05:20:14 host sshd[24049]: Failed password for invalid user liuhao from 190.120.254.76 port 43313 ssh2 Jan 14 05:20:14 host sshd[24049]: Received disconnect from 190.120.254.76 port 43313:11: Bye Bye [preauth] Jan 14 05:20:14 host sshd[24049]: Disconnected from 190.120.254.76 port 43313 [preauth] Jan 14 05:20:24 host sshd[24194]: Invalid user song from 156.236.73.114 port 59633 Jan 14 05:20:24 host sshd[24194]: input_userauth_request: invalid user song [preauth] Jan 14 05:20:24 host sshd[24194]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:20:24 host sshd[24194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.73.114 Jan 14 05:20:26 host sshd[24194]: Failed password for invalid user song from 156.236.73.114 port 59633 ssh2 Jan 14 05:20:26 host sshd[24194]: Received disconnect from 156.236.73.114 port 59633:11: Bye Bye [preauth] Jan 14 05:20:26 host sshd[24194]: Disconnected from 156.236.73.114 port 59633 [preauth] Jan 14 05:20:44 host sshd[24277]: User root from 167.71.25.186 not allowed because not listed in AllowUsers Jan 14 05:20:44 host sshd[24277]: input_userauth_request: invalid user root [preauth] Jan 14 05:20:44 host unix_chkpwd[24283]: password check failed for user (root) Jan 14 05:20:44 host sshd[24277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.25.186 user=root Jan 14 05:20:44 host sshd[24277]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:20:46 host sshd[24277]: Failed password for invalid user root from 167.71.25.186 port 47460 ssh2 Jan 14 05:20:46 host sshd[24277]: Received disconnect from 167.71.25.186 port 47460:11: Bye Bye [preauth] Jan 14 05:20:46 host sshd[24277]: Disconnected from 167.71.25.186 port 47460 [preauth] Jan 14 05:20:54 host sshd[24292]: Invalid user prueba from 134.122.30.150 port 47082 Jan 14 05:20:54 host sshd[24292]: input_userauth_request: invalid user prueba [preauth] Jan 14 05:20:54 host sshd[24292]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:20:54 host sshd[24292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.30.150 Jan 14 05:20:56 host sshd[24292]: Failed password for invalid user prueba from 134.122.30.150 port 47082 ssh2 Jan 14 05:20:56 host sshd[24292]: Received disconnect from 134.122.30.150 port 47082:11: Bye Bye [preauth] Jan 14 05:20:56 host sshd[24292]: Disconnected from 134.122.30.150 port 47082 [preauth] Jan 14 05:21:32 host sshd[24374]: Invalid user postgres from 121.191.14.235 port 63115 Jan 14 05:21:32 host sshd[24374]: input_userauth_request: invalid user postgres [preauth] Jan 14 05:21:32 host sshd[24374]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:21:32 host sshd[24374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.191.14.235 Jan 14 05:21:34 host sshd[24374]: Failed password for invalid user postgres from 121.191.14.235 port 63115 ssh2 Jan 14 05:21:35 host sshd[24374]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:21:37 host sshd[24374]: Failed password for invalid user postgres from 121.191.14.235 port 63115 ssh2 Jan 14 05:21:38 host sshd[24374]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:21:40 host sshd[24374]: Failed password for invalid user postgres from 121.191.14.235 port 63115 ssh2 Jan 14 05:21:41 host sshd[24374]: Connection reset by 121.191.14.235 port 63115 [preauth] Jan 14 05:21:41 host sshd[24374]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.191.14.235 Jan 14 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=remysagr user-15=disposeat user-16=wwwkmaorg user-17=pmcresources user-18=vfmassets user-19=shalinijames user-20=wwwtestugo user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=palco123 user-28=gifterman user-29=kottayamcalldriv user-30=phmetals feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 05:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 14 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 14 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 14 05:22:01 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 14 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 14 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 14 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 14 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 14 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 14 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 05:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 14 05:22:03 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 14 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-yG2KHrz8Qjha6oze.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-yG2KHrz8Qjha6oze.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 14 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 14 05:22:04 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 14 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 14 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 14 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-V17Ci9lsHO7cDppw.wp-toolkit-identifier Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 14 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-V17Ci9lsHO7cDppw.wp-toolkit-identifier Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 14 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 05:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CovPv4s3yqsiWGc9.~ Jan 14 05:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CovPv4s3yqsiWGc9.~' Jan 14 05:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CovPv4s3yqsiWGc9.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 05:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 05:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 05:22:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 05:22:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 05:22:35 host sshd[25151]: Invalid user Tadako from 206.189.44.27 port 57106 Jan 14 05:22:35 host sshd[25151]: input_userauth_request: invalid user Tadako [preauth] Jan 14 05:22:35 host sshd[25151]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:22:35 host sshd[25151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.44.27 Jan 14 05:22:37 host sshd[25151]: Failed password for invalid user Tadako from 206.189.44.27 port 57106 ssh2 Jan 14 05:22:37 host sshd[25151]: Received disconnect from 206.189.44.27 port 57106:11: Bye Bye [preauth] Jan 14 05:22:37 host sshd[25151]: Disconnected from 206.189.44.27 port 57106 [preauth] Jan 14 05:23:20 host sshd[25265]: Invalid user school from 180.190.241.88 port 49998 Jan 14 05:23:20 host sshd[25265]: input_userauth_request: invalid user school [preauth] Jan 14 05:23:20 host sshd[25265]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:23:20 host sshd[25265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88 Jan 14 05:23:22 host sshd[25265]: Failed password for invalid user school from 180.190.241.88 port 49998 ssh2 Jan 14 05:23:23 host sshd[25265]: Received disconnect from 180.190.241.88 port 49998:11: Bye Bye [preauth] Jan 14 05:23:23 host sshd[25265]: Disconnected from 180.190.241.88 port 49998 [preauth] Jan 14 05:24:10 host sshd[25378]: Invalid user lll from 167.71.25.186 port 38998 Jan 14 05:24:10 host sshd[25378]: input_userauth_request: invalid user lll [preauth] Jan 14 05:24:10 host sshd[25378]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:24:10 host sshd[25378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.25.186 Jan 14 05:24:12 host sshd[25378]: Failed password for invalid user lll from 167.71.25.186 port 38998 ssh2 Jan 14 05:24:12 host sshd[25378]: Received disconnect from 167.71.25.186 port 38998:11: Bye Bye [preauth] Jan 14 05:24:12 host sshd[25378]: Disconnected from 167.71.25.186 port 38998 [preauth] Jan 14 05:24:31 host sshd[25462]: User root from 156.236.73.114 not allowed because not listed in AllowUsers Jan 14 05:24:31 host sshd[25462]: input_userauth_request: invalid user root [preauth] Jan 14 05:24:31 host unix_chkpwd[25464]: password check failed for user (root) Jan 14 05:24:31 host sshd[25462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.73.114 user=root Jan 14 05:24:31 host sshd[25462]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:24:33 host sshd[25462]: Failed password for invalid user root from 156.236.73.114 port 53649 ssh2 Jan 14 05:24:33 host sshd[25462]: Received disconnect from 156.236.73.114 port 53649:11: Bye Bye [preauth] Jan 14 05:24:33 host sshd[25462]: Disconnected from 156.236.73.114 port 53649 [preauth] Jan 14 05:24:35 host sshd[25474]: User root from 190.120.254.76 not allowed because not listed in AllowUsers Jan 14 05:24:35 host sshd[25474]: input_userauth_request: invalid user root [preauth] Jan 14 05:24:35 host unix_chkpwd[25509]: password check failed for user (root) Jan 14 05:24:35 host sshd[25474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.120.254.76 user=root Jan 14 05:24:35 host sshd[25474]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:24:37 host sshd[25474]: Failed password for invalid user root from 190.120.254.76 port 38747 ssh2 Jan 14 05:24:37 host sshd[25474]: Received disconnect from 190.120.254.76 port 38747:11: Bye Bye [preauth] Jan 14 05:24:37 host sshd[25474]: Disconnected from 190.120.254.76 port 38747 [preauth] Jan 14 05:24:50 host sshd[25561]: User root from 188.170.13.225 not allowed because not listed in AllowUsers Jan 14 05:24:50 host sshd[25561]: input_userauth_request: invalid user root [preauth] Jan 14 05:24:50 host unix_chkpwd[25565]: password check failed for user (root) Jan 14 05:24:50 host sshd[25561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.13.225 user=root Jan 14 05:24:50 host sshd[25561]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:24:52 host sshd[25561]: Failed password for invalid user root from 188.170.13.225 port 51034 ssh2 Jan 14 05:24:52 host sshd[25561]: Received disconnect from 188.170.13.225 port 51034:11: Bye Bye [preauth] Jan 14 05:24:52 host sshd[25561]: Disconnected from 188.170.13.225 port 51034 [preauth] Jan 14 05:25:06 host sshd[25637]: User root from 134.122.30.150 not allowed because not listed in AllowUsers Jan 14 05:25:06 host sshd[25637]: input_userauth_request: invalid user root [preauth] Jan 14 05:25:06 host unix_chkpwd[25644]: password check failed for user (root) Jan 14 05:25:06 host sshd[25637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.30.150 user=root Jan 14 05:25:06 host sshd[25637]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:25:08 host sshd[25637]: Failed password for invalid user root from 134.122.30.150 port 38622 ssh2 Jan 14 05:25:08 host sshd[25637]: Received disconnect from 134.122.30.150 port 38622:11: Bye Bye [preauth] Jan 14 05:25:08 host sshd[25637]: Disconnected from 134.122.30.150 port 38622 [preauth] Jan 14 05:25:31 host sshd[25741]: User root from 80.68.7.179 not allowed because not listed in AllowUsers Jan 14 05:25:31 host sshd[25741]: input_userauth_request: invalid user root [preauth] Jan 14 05:25:31 host unix_chkpwd[25744]: password check failed for user (root) Jan 14 05:25:31 host sshd[25741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.179 user=root Jan 14 05:25:31 host sshd[25741]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:25:34 host sshd[25741]: Failed password for invalid user root from 80.68.7.179 port 51370 ssh2 Jan 14 05:25:34 host sshd[25741]: Received disconnect from 80.68.7.179 port 51370:11: Bye Bye [preauth] Jan 14 05:25:34 host sshd[25741]: Disconnected from 80.68.7.179 port 51370 [preauth] Jan 14 05:25:49 host sshd[25906]: User root from 206.189.44.27 not allowed because not listed in AllowUsers Jan 14 05:25:49 host sshd[25906]: input_userauth_request: invalid user root [preauth] Jan 14 05:25:49 host unix_chkpwd[25908]: password check failed for user (root) Jan 14 05:25:49 host sshd[25906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.44.27 user=root Jan 14 05:25:49 host sshd[25906]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:25:51 host sshd[25906]: Failed password for invalid user root from 206.189.44.27 port 60016 ssh2 Jan 14 05:25:51 host sshd[25906]: Received disconnect from 206.189.44.27 port 60016:11: Bye Bye [preauth] Jan 14 05:25:51 host sshd[25906]: Disconnected from 206.189.44.27 port 60016 [preauth] Jan 14 05:26:12 host sshd[25979]: User root from 180.190.241.88 not allowed because not listed in AllowUsers Jan 14 05:26:12 host sshd[25979]: input_userauth_request: invalid user root [preauth] Jan 14 05:26:12 host unix_chkpwd[25982]: password check failed for user (root) Jan 14 05:26:12 host sshd[25979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.190.241.88 user=root Jan 14 05:26:12 host sshd[25979]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:26:14 host sshd[25979]: Failed password for invalid user root from 180.190.241.88 port 31896 ssh2 Jan 14 05:26:14 host sshd[25979]: Received disconnect from 180.190.241.88 port 31896:11: Bye Bye [preauth] Jan 14 05:26:14 host sshd[25979]: Disconnected from 180.190.241.88 port 31896 [preauth] Jan 14 05:28:13 host sshd[26295]: User root from 14.42.60.27 not allowed because not listed in AllowUsers Jan 14 05:28:13 host sshd[26295]: input_userauth_request: invalid user root [preauth] Jan 14 05:28:13 host unix_chkpwd[26301]: password check failed for user (root) Jan 14 05:28:13 host sshd[26295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.42.60.27 user=root Jan 14 05:28:13 host sshd[26295]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:28:15 host sshd[26295]: Failed password for invalid user root from 14.42.60.27 port 63221 ssh2 Jan 14 05:28:16 host unix_chkpwd[26312]: password check failed for user (root) Jan 14 05:28:16 host sshd[26295]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:28:19 host sshd[26295]: Failed password for invalid user root from 14.42.60.27 port 63221 ssh2 Jan 14 05:28:20 host unix_chkpwd[26318]: password check failed for user (root) Jan 14 05:28:20 host sshd[26295]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:28:22 host sshd[26295]: Failed password for invalid user root from 14.42.60.27 port 63221 ssh2 Jan 14 05:28:23 host unix_chkpwd[26321]: password check failed for user (root) Jan 14 05:28:23 host sshd[26295]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:28:25 host sshd[26295]: Failed password for invalid user root from 14.42.60.27 port 63221 ssh2 Jan 14 05:43:43 host sshd[28532]: Invalid user pi from 220.134.154.23 port 35890 Jan 14 05:43:43 host sshd[28532]: input_userauth_request: invalid user pi [preauth] Jan 14 05:43:43 host sshd[28532]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:43:43 host sshd[28532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.154.23 Jan 14 05:43:45 host sshd[28532]: Failed password for invalid user pi from 220.134.154.23 port 35890 ssh2 Jan 14 05:43:47 host sshd[28532]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:43:49 host sshd[28532]: Failed password for invalid user pi from 220.134.154.23 port 35890 ssh2 Jan 14 05:43:50 host sshd[28532]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:43:52 host sshd[28532]: Failed password for invalid user pi from 220.134.154.23 port 35890 ssh2 Jan 14 05:43:52 host sshd[28532]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:43:54 host sshd[28532]: Failed password for invalid user pi from 220.134.154.23 port 35890 ssh2 Jan 14 05:44:06 host sshd[28745]: Invalid user emp from 159.223.135.216 port 55566 Jan 14 05:44:06 host sshd[28745]: input_userauth_request: invalid user emp [preauth] Jan 14 05:44:06 host sshd[28745]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:44:06 host sshd[28745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.135.216 Jan 14 05:44:08 host sshd[28745]: Failed password for invalid user emp from 159.223.135.216 port 55566 ssh2 Jan 14 05:44:08 host sshd[28745]: Received disconnect from 159.223.135.216 port 55566:11: Bye Bye [preauth] Jan 14 05:44:08 host sshd[28745]: Disconnected from 159.223.135.216 port 55566 [preauth] Jan 14 05:44:12 host sshd[28752]: Invalid user test from 143.202.209.20 port 51105 Jan 14 05:44:12 host sshd[28752]: input_userauth_request: invalid user test [preauth] Jan 14 05:44:12 host sshd[28752]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:44:12 host sshd[28752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.202.209.20 Jan 14 05:44:14 host sshd[28752]: Failed password for invalid user test from 143.202.209.20 port 51105 ssh2 Jan 14 05:44:14 host sshd[28752]: Received disconnect from 143.202.209.20 port 51105:11: Bye Bye [preauth] Jan 14 05:44:14 host sshd[28752]: Disconnected from 143.202.209.20 port 51105 [preauth] Jan 14 05:45:13 host sshd[28895]: Invalid user megafon from 188.166.240.186 port 34682 Jan 14 05:45:13 host sshd[28895]: input_userauth_request: invalid user megafon [preauth] Jan 14 05:45:13 host sshd[28895]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:45:13 host sshd[28895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.186 Jan 14 05:45:15 host sshd[28895]: Failed password for invalid user megafon from 188.166.240.186 port 34682 ssh2 Jan 14 05:45:15 host sshd[28895]: Received disconnect from 188.166.240.186 port 34682:11: Bye Bye [preauth] Jan 14 05:45:15 host sshd[28895]: Disconnected from 188.166.240.186 port 34682 [preauth] Jan 14 05:46:15 host sshd[29031]: Invalid user songjiazhi from 23.25.61.202 port 57465 Jan 14 05:46:15 host sshd[29031]: input_userauth_request: invalid user songjiazhi [preauth] Jan 14 05:46:15 host sshd[29031]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:46:15 host sshd[29031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.25.61.202 Jan 14 05:46:16 host sshd[29031]: Failed password for invalid user songjiazhi from 23.25.61.202 port 57465 ssh2 Jan 14 05:46:17 host sshd[29031]: Received disconnect from 23.25.61.202 port 57465:11: Bye Bye [preauth] Jan 14 05:46:17 host sshd[29031]: Disconnected from 23.25.61.202 port 57465 [preauth] Jan 14 05:46:40 host sshd[29092]: Invalid user test from 142.93.194.20 port 51734 Jan 14 05:46:40 host sshd[29092]: input_userauth_request: invalid user test [preauth] Jan 14 05:46:40 host sshd[29092]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:46:40 host sshd[29092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.194.20 Jan 14 05:46:42 host sshd[29092]: Failed password for invalid user test from 142.93.194.20 port 51734 ssh2 Jan 14 05:46:42 host sshd[29092]: Received disconnect from 142.93.194.20 port 51734:11: Bye Bye [preauth] Jan 14 05:46:42 host sshd[29092]: Disconnected from 142.93.194.20 port 51734 [preauth] Jan 14 05:47:00 host sshd[29149]: Invalid user target from 51.75.143.42 port 39429 Jan 14 05:47:00 host sshd[29149]: input_userauth_request: invalid user target [preauth] Jan 14 05:47:00 host sshd[29149]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:47:00 host sshd[29149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.143.42 Jan 14 05:47:03 host sshd[29149]: Failed password for invalid user target from 51.75.143.42 port 39429 ssh2 Jan 14 05:47:03 host sshd[29149]: Received disconnect from 51.75.143.42 port 39429:11: Bye Bye [preauth] Jan 14 05:47:03 host sshd[29149]: Disconnected from 51.75.143.42 port 39429 [preauth] Jan 14 05:48:31 host sshd[29375]: Invalid user Yasuko from 81.211.122.10 port 54300 Jan 14 05:48:31 host sshd[29375]: input_userauth_request: invalid user Yasuko [preauth] Jan 14 05:48:31 host sshd[29375]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:48:31 host sshd[29375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.211.122.10 Jan 14 05:48:34 host sshd[29375]: Failed password for invalid user Yasuko from 81.211.122.10 port 54300 ssh2 Jan 14 05:48:34 host sshd[29375]: Received disconnect from 81.211.122.10 port 54300:11: Bye Bye [preauth] Jan 14 05:48:34 host sshd[29375]: Disconnected from 81.211.122.10 port 54300 [preauth] Jan 14 05:49:12 host sshd[29443]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 14 05:49:12 host sshd[29443]: input_userauth_request: invalid user root [preauth] Jan 14 05:49:12 host unix_chkpwd[29447]: password check failed for user (root) Jan 14 05:49:12 host sshd[29443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 14 05:49:12 host sshd[29443]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:49:13 host sshd[29443]: Failed password for invalid user root from 195.226.194.142 port 36374 ssh2 Jan 14 05:49:14 host sshd[29443]: Received disconnect from 195.226.194.142 port 36374:11: Bye Bye [preauth] Jan 14 05:49:14 host sshd[29443]: Disconnected from 195.226.194.142 port 36374 [preauth] Jan 14 05:49:32 host sshd[29598]: Connection closed by 223.113.121.94 port 33088 [preauth] Jan 14 05:50:13 host sshd[29714]: Invalid user newftpus from 159.223.135.216 port 45452 Jan 14 05:50:13 host sshd[29714]: input_userauth_request: invalid user newftpus [preauth] Jan 14 05:50:13 host sshd[29714]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:50:13 host sshd[29714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.135.216 Jan 14 05:50:15 host sshd[29714]: Failed password for invalid user newftpus from 159.223.135.216 port 45452 ssh2 Jan 14 05:50:15 host sshd[29714]: Received disconnect from 159.223.135.216 port 45452:11: Bye Bye [preauth] Jan 14 05:50:15 host sshd[29714]: Disconnected from 159.223.135.216 port 45452 [preauth] Jan 14 05:50:21 host sshd[29737]: Invalid user Yasuko from 188.166.240.186 port 58328 Jan 14 05:50:21 host sshd[29737]: input_userauth_request: invalid user Yasuko [preauth] Jan 14 05:50:21 host sshd[29737]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:50:21 host sshd[29737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.186 Jan 14 05:50:23 host sshd[29737]: Failed password for invalid user Yasuko from 188.166.240.186 port 58328 ssh2 Jan 14 05:50:23 host sshd[29737]: Received disconnect from 188.166.240.186 port 58328:11: Bye Bye [preauth] Jan 14 05:50:23 host sshd[29737]: Disconnected from 188.166.240.186 port 58328 [preauth] Jan 14 05:50:33 host sshd[29772]: Invalid user zyj from 51.75.143.42 port 59049 Jan 14 05:50:33 host sshd[29772]: input_userauth_request: invalid user zyj [preauth] Jan 14 05:50:33 host sshd[29772]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:50:33 host sshd[29772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.143.42 Jan 14 05:50:35 host sshd[29772]: Failed password for invalid user zyj from 51.75.143.42 port 59049 ssh2 Jan 14 05:50:35 host sshd[29772]: Received disconnect from 51.75.143.42 port 59049:11: Bye Bye [preauth] Jan 14 05:50:35 host sshd[29772]: Disconnected from 51.75.143.42 port 59049 [preauth] Jan 14 05:50:36 host sshd[29777]: Invalid user cristian from 143.202.209.20 port 50610 Jan 14 05:50:36 host sshd[29777]: input_userauth_request: invalid user cristian [preauth] Jan 14 05:50:36 host sshd[29777]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:50:36 host sshd[29777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.202.209.20 Jan 14 05:50:37 host sshd[29777]: Failed password for invalid user cristian from 143.202.209.20 port 50610 ssh2 Jan 14 05:50:38 host sshd[29777]: Received disconnect from 143.202.209.20 port 50610:11: Bye Bye [preauth] Jan 14 05:50:38 host sshd[29777]: Disconnected from 143.202.209.20 port 50610 [preauth] Jan 14 05:50:53 host sshd[29810]: Invalid user postgres from 142.93.194.20 port 43532 Jan 14 05:50:53 host sshd[29810]: input_userauth_request: invalid user postgres [preauth] Jan 14 05:50:53 host sshd[29810]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:50:53 host sshd[29810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.194.20 Jan 14 05:50:55 host sshd[29810]: Failed password for invalid user postgres from 142.93.194.20 port 43532 ssh2 Jan 14 05:50:56 host sshd[29810]: Received disconnect from 142.93.194.20 port 43532:11: Bye Bye [preauth] Jan 14 05:50:56 host sshd[29810]: Disconnected from 142.93.194.20 port 43532 [preauth] Jan 14 05:51:13 host sshd[29855]: Invalid user lys from 81.211.122.10 port 49472 Jan 14 05:51:13 host sshd[29855]: input_userauth_request: invalid user lys [preauth] Jan 14 05:51:13 host sshd[29855]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:51:13 host sshd[29855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.211.122.10 Jan 14 05:51:15 host sshd[29855]: Failed password for invalid user lys from 81.211.122.10 port 49472 ssh2 Jan 14 05:51:15 host sshd[29855]: Received disconnect from 81.211.122.10 port 49472:11: Bye Bye [preauth] Jan 14 05:51:15 host sshd[29855]: Disconnected from 81.211.122.10 port 49472 [preauth] Jan 14 05:51:16 host sshd[29869]: Invalid user unify from 159.223.135.216 port 52424 Jan 14 05:51:16 host sshd[29869]: input_userauth_request: invalid user unify [preauth] Jan 14 05:51:16 host sshd[29869]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:51:16 host sshd[29869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.135.216 Jan 14 05:51:18 host sshd[29869]: Failed password for invalid user unify from 159.223.135.216 port 52424 ssh2 Jan 14 05:51:19 host sshd[29869]: Received disconnect from 159.223.135.216 port 52424:11: Bye Bye [preauth] Jan 14 05:51:19 host sshd[29869]: Disconnected from 159.223.135.216 port 52424 [preauth] Jan 14 05:51:33 host sshd[29947]: Invalid user newftpus from 51.75.143.42 port 42063 Jan 14 05:51:33 host sshd[29947]: input_userauth_request: invalid user newftpus [preauth] Jan 14 05:51:33 host sshd[29947]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:51:33 host sshd[29947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.143.42 Jan 14 05:51:35 host sshd[29947]: Failed password for invalid user newftpus from 51.75.143.42 port 42063 ssh2 Jan 14 05:51:35 host sshd[29947]: Received disconnect from 51.75.143.42 port 42063:11: Bye Bye [preauth] Jan 14 05:51:35 host sshd[29947]: Disconnected from 51.75.143.42 port 42063 [preauth] Jan 14 05:51:40 host sshd[30012]: Invalid user roberto from 23.25.61.202 port 42339 Jan 14 05:51:40 host sshd[30012]: input_userauth_request: invalid user roberto [preauth] Jan 14 05:51:40 host sshd[30012]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:51:40 host sshd[30012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.25.61.202 Jan 14 05:51:42 host sshd[30012]: Failed password for invalid user roberto from 23.25.61.202 port 42339 ssh2 Jan 14 05:51:43 host sshd[30012]: Received disconnect from 23.25.61.202 port 42339:11: Bye Bye [preauth] Jan 14 05:51:43 host sshd[30012]: Disconnected from 23.25.61.202 port 42339 [preauth] Jan 14 05:51:46 host sshd[30021]: Invalid user ubuntu from 188.166.240.186 port 56784 Jan 14 05:51:46 host sshd[30021]: input_userauth_request: invalid user ubuntu [preauth] Jan 14 05:51:46 host sshd[30021]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:51:46 host sshd[30021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.186 Jan 14 05:51:48 host sshd[30021]: Failed password for invalid user ubuntu from 188.166.240.186 port 56784 ssh2 Jan 14 05:51:48 host sshd[30021]: Received disconnect from 188.166.240.186 port 56784:11: Bye Bye [preauth] Jan 14 05:51:48 host sshd[30021]: Disconnected from 188.166.240.186 port 56784 [preauth] Jan 14 05:51:52 host sshd[30057]: Invalid user user from 142.93.194.20 port 37232 Jan 14 05:51:52 host sshd[30057]: input_userauth_request: invalid user user [preauth] Jan 14 05:51:52 host sshd[30057]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:51:52 host sshd[30057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.194.20 Jan 14 05:51:54 host sshd[30057]: Failed password for invalid user user from 142.93.194.20 port 37232 ssh2 Jan 14 05:51:54 host sshd[30057]: Received disconnect from 142.93.194.20 port 37232:11: Bye Bye [preauth] Jan 14 05:51:54 host sshd[30057]: Disconnected from 142.93.194.20 port 37232 [preauth] Jan 14 05:51:54 host sshd[30064]: Invalid user jyl from 143.202.209.20 port 33621 Jan 14 05:51:54 host sshd[30064]: input_userauth_request: invalid user jyl [preauth] Jan 14 05:51:54 host sshd[30064]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:51:54 host sshd[30064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.202.209.20 Jan 14 05:51:57 host sshd[30064]: Failed password for invalid user jyl from 143.202.209.20 port 33621 ssh2 Jan 14 05:52:19 host sshd[30172]: Invalid user test from 63.41.9.210 port 53697 Jan 14 05:52:19 host sshd[30172]: input_userauth_request: invalid user test [preauth] Jan 14 05:52:19 host sshd[30172]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:52:19 host sshd[30172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.41.9.210 Jan 14 05:52:22 host sshd[30172]: Failed password for invalid user test from 63.41.9.210 port 53697 ssh2 Jan 14 05:52:22 host sshd[30172]: Received disconnect from 63.41.9.210 port 53697:11: Bye Bye [preauth] Jan 14 05:52:22 host sshd[30172]: Disconnected from 63.41.9.210 port 53697 [preauth] Jan 14 05:52:47 host sshd[30238]: Invalid user webmaster from 23.25.61.202 port 55692 Jan 14 05:52:47 host sshd[30238]: input_userauth_request: invalid user webmaster [preauth] Jan 14 05:52:47 host sshd[30238]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:52:47 host sshd[30238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.25.61.202 Jan 14 05:52:49 host sshd[30238]: Failed password for invalid user webmaster from 23.25.61.202 port 55692 ssh2 Jan 14 05:52:49 host sshd[30238]: Received disconnect from 23.25.61.202 port 55692:11: Bye Bye [preauth] Jan 14 05:52:49 host sshd[30238]: Disconnected from 23.25.61.202 port 55692 [preauth] Jan 14 05:52:50 host sshd[30248]: User root from 81.211.122.10 not allowed because not listed in AllowUsers Jan 14 05:52:50 host sshd[30248]: input_userauth_request: invalid user root [preauth] Jan 14 05:52:50 host unix_chkpwd[30269]: password check failed for user (root) Jan 14 05:52:50 host sshd[30248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.211.122.10 user=root Jan 14 05:52:50 host sshd[30248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 05:52:52 host sshd[30248]: Failed password for invalid user root from 81.211.122.10 port 33210 ssh2 Jan 14 05:52:52 host sshd[30248]: Received disconnect from 81.211.122.10 port 33210:11: Bye Bye [preauth] Jan 14 05:52:52 host sshd[30248]: Disconnected from 81.211.122.10 port 33210 [preauth] Jan 14 05:58:08 host sshd[31183]: Invalid user postgres from 63.41.9.210 port 48312 Jan 14 05:58:08 host sshd[31183]: input_userauth_request: invalid user postgres [preauth] Jan 14 05:58:08 host sshd[31183]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:58:08 host sshd[31183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.41.9.210 Jan 14 05:58:10 host sshd[31183]: Failed password for invalid user postgres from 63.41.9.210 port 48312 ssh2 Jan 14 05:58:10 host sshd[31183]: Received disconnect from 63.41.9.210 port 48312:11: Bye Bye [preauth] Jan 14 05:58:10 host sshd[31183]: Disconnected from 63.41.9.210 port 48312 [preauth] Jan 14 05:58:19 host sshd[31206]: Invalid user readwrite from 205.185.113.129 port 54368 Jan 14 05:58:19 host sshd[31206]: input_userauth_request: invalid user readwrite [preauth] Jan 14 05:58:19 host sshd[31206]: pam_unix(sshd:auth): check pass; user unknown Jan 14 05:58:19 host sshd[31206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 14 05:58:21 host sshd[31206]: Failed password for invalid user readwrite from 205.185.113.129 port 54368 ssh2 Jan 14 05:58:22 host sshd[31206]: Connection closed by 205.185.113.129 port 54368 [preauth] Jan 14 06:02:49 host sshd[31997]: Invalid user xxx from 63.41.9.210 port 39761 Jan 14 06:02:49 host sshd[31997]: input_userauth_request: invalid user xxx [preauth] Jan 14 06:02:49 host sshd[31997]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:02:49 host sshd[31997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.41.9.210 Jan 14 06:02:51 host sshd[31997]: Failed password for invalid user xxx from 63.41.9.210 port 39761 ssh2 Jan 14 06:04:03 host sshd[32222]: User root from 146.190.116.107 not allowed because not listed in AllowUsers Jan 14 06:04:03 host sshd[32222]: input_userauth_request: invalid user root [preauth] Jan 14 06:04:03 host unix_chkpwd[32230]: password check failed for user (root) Jan 14 06:04:03 host sshd[32222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.116.107 user=root Jan 14 06:04:03 host sshd[32222]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 06:04:05 host sshd[32222]: Failed password for invalid user root from 146.190.116.107 port 36994 ssh2 Jan 14 06:04:05 host sshd[32222]: Received disconnect from 146.190.116.107 port 36994:11: Bye Bye [preauth] Jan 14 06:04:05 host sshd[32222]: Disconnected from 146.190.116.107 port 36994 [preauth] Jan 14 06:04:07 host sshd[32236]: User root from 146.190.116.107 not allowed because not listed in AllowUsers Jan 14 06:04:07 host sshd[32236]: input_userauth_request: invalid user root [preauth] Jan 14 06:04:07 host unix_chkpwd[32241]: password check failed for user (root) Jan 14 06:04:07 host sshd[32236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.116.107 user=root Jan 14 06:04:07 host sshd[32236]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 06:04:09 host sshd[32236]: Failed password for invalid user root from 146.190.116.107 port 41754 ssh2 Jan 14 06:04:10 host sshd[32236]: Received disconnect from 146.190.116.107 port 41754:11: Bye Bye [preauth] Jan 14 06:04:10 host sshd[32236]: Disconnected from 146.190.116.107 port 41754 [preauth] Jan 14 06:05:25 host sshd[32556]: Did not receive identification string from 89.248.163.191 port 58350 Jan 14 06:08:58 host sshd[621]: Invalid user user from 128.134.23.16 port 60519 Jan 14 06:08:58 host sshd[621]: input_userauth_request: invalid user user [preauth] Jan 14 06:08:58 host sshd[621]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:08:58 host sshd[621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.23.16 Jan 14 06:09:00 host sshd[621]: Failed password for invalid user user from 128.134.23.16 port 60519 ssh2 Jan 14 06:10:31 host sshd[905]: Connection closed by 172.105.128.12 port 42204 [preauth] Jan 14 06:10:33 host sshd[910]: Connection closed by 172.105.128.12 port 42208 [preauth] Jan 14 06:10:34 host sshd[914]: Connection closed by 172.105.128.12 port 42210 [preauth] Jan 14 06:21:12 host sshd[2616]: Invalid user nexidigital from 159.89.185.234 port 33318 Jan 14 06:21:12 host sshd[2616]: input_userauth_request: invalid user nexidigital [preauth] Jan 14 06:21:13 host sshd[2616]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:21:13 host sshd[2616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 14 06:21:14 host sshd[2616]: Failed password for invalid user nexidigital from 159.89.185.234 port 33318 ssh2 Jan 14 06:21:15 host sshd[2616]: Connection closed by 159.89.185.234 port 33318 [preauth] Jan 14 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=ugotscom user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=wwwkmaorg user-15=disposeat user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=wwwtestugo user-20=shalinijames user-21=wwwletsstalkfood user-22=straightcurve user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=gifterman user-28=palco123 user-29=kottayamcalldriv user-30=phmetals feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 06:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-C8Aa5tkZlgl0Lv9u.~ Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-C8Aa5tkZlgl0Lv9u.~' Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-C8Aa5tkZlgl0Lv9u.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 06:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 06:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 06:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 06:24:06 host sshd[3311]: Invalid user logz from 86.57.237.202 port 57670 Jan 14 06:24:06 host sshd[3311]: input_userauth_request: invalid user logz [preauth] Jan 14 06:24:06 host sshd[3311]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:24:06 host sshd[3311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.57.237.202 Jan 14 06:24:07 host sshd[3311]: Failed password for invalid user logz from 86.57.237.202 port 57670 ssh2 Jan 14 06:24:08 host sshd[3311]: Received disconnect from 86.57.237.202 port 57670:11: Bye Bye [preauth] Jan 14 06:24:08 host sshd[3311]: Disconnected from 86.57.237.202 port 57670 [preauth] Jan 14 06:24:52 host sshd[3398]: Invalid user xxin from 43.155.95.97 port 55488 Jan 14 06:24:52 host sshd[3398]: input_userauth_request: invalid user xxin [preauth] Jan 14 06:24:52 host sshd[3398]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:24:52 host sshd[3398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.95.97 Jan 14 06:24:54 host sshd[3398]: Failed password for invalid user xxin from 43.155.95.97 port 55488 ssh2 Jan 14 06:24:54 host sshd[3398]: Received disconnect from 43.155.95.97 port 55488:11: Bye Bye [preauth] Jan 14 06:24:54 host sshd[3398]: Disconnected from 43.155.95.97 port 55488 [preauth] Jan 14 06:25:12 host sshd[3462]: Invalid user admin from 211.194.3.98 port 43545 Jan 14 06:25:12 host sshd[3462]: input_userauth_request: invalid user admin [preauth] Jan 14 06:25:12 host sshd[3462]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:25:12 host sshd[3462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.194.3.98 Jan 14 06:25:13 host sshd[3470]: Invalid user du from 194.110.203.109 port 38638 Jan 14 06:25:13 host sshd[3470]: input_userauth_request: invalid user du [preauth] Jan 14 06:25:13 host sshd[3470]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:25:13 host sshd[3470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 06:25:15 host sshd[3462]: Failed password for invalid user admin from 211.194.3.98 port 43545 ssh2 Jan 14 06:25:16 host sshd[3470]: Failed password for invalid user du from 194.110.203.109 port 38638 ssh2 Jan 14 06:25:16 host sshd[3462]: Failed password for invalid user admin from 211.194.3.98 port 43545 ssh2 Jan 14 06:25:17 host sshd[3462]: Connection reset by 211.194.3.98 port 43545 [preauth] Jan 14 06:25:19 host sshd[3470]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:25:21 host sshd[3470]: Failed password for invalid user du from 194.110.203.109 port 38638 ssh2 Jan 14 06:25:24 host sshd[3470]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:25:26 host sshd[3470]: Failed password for invalid user du from 194.110.203.109 port 38638 ssh2 Jan 14 06:25:29 host sshd[3470]: Connection closed by 194.110.203.109 port 38638 [preauth] Jan 14 06:25:29 host sshd[3470]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 06:25:47 host sshd[3559]: Invalid user vision from 210.245.92.136 port 34521 Jan 14 06:25:47 host sshd[3559]: input_userauth_request: invalid user vision [preauth] Jan 14 06:25:47 host sshd[3559]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:25:47 host sshd[3559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.136 Jan 14 06:25:49 host sshd[3559]: Failed password for invalid user vision from 210.245.92.136 port 34521 ssh2 Jan 14 06:25:49 host sshd[3559]: Received disconnect from 210.245.92.136 port 34521:11: Bye Bye [preauth] Jan 14 06:25:49 host sshd[3559]: Disconnected from 210.245.92.136 port 34521 [preauth] Jan 14 06:27:11 host sshd[3722]: Invalid user jobs from 201.32.178.190 port 54544 Jan 14 06:27:11 host sshd[3722]: input_userauth_request: invalid user jobs [preauth] Jan 14 06:27:11 host sshd[3722]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:27:11 host sshd[3722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.32.178.190 Jan 14 06:27:13 host sshd[3722]: Failed password for invalid user jobs from 201.32.178.190 port 54544 ssh2 Jan 14 06:27:14 host sshd[3722]: Received disconnect from 201.32.178.190 port 54544:11: Bye Bye [preauth] Jan 14 06:27:14 host sshd[3722]: Disconnected from 201.32.178.190 port 54544 [preauth] Jan 14 06:28:58 host sshd[4097]: Invalid user pi from 75.15.181.126 port 42412 Jan 14 06:28:58 host sshd[4097]: input_userauth_request: invalid user pi [preauth] Jan 14 06:28:58 host sshd[4099]: Invalid user pi from 75.15.181.126 port 42420 Jan 14 06:28:58 host sshd[4099]: input_userauth_request: invalid user pi [preauth] Jan 14 06:28:58 host sshd[4097]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:28:58 host sshd[4097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.15.181.126 Jan 14 06:28:58 host sshd[4099]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:28:58 host sshd[4099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.15.181.126 Jan 14 06:29:00 host sshd[4097]: Failed password for invalid user pi from 75.15.181.126 port 42412 ssh2 Jan 14 06:29:00 host sshd[4099]: Failed password for invalid user pi from 75.15.181.126 port 42420 ssh2 Jan 14 06:29:00 host sshd[4097]: Connection closed by 75.15.181.126 port 42412 [preauth] Jan 14 06:29:00 host sshd[4099]: Connection closed by 75.15.181.126 port 42420 [preauth] Jan 14 06:29:42 host sshd[4205]: Invalid user centor from 210.245.92.136 port 53300 Jan 14 06:29:42 host sshd[4205]: input_userauth_request: invalid user centor [preauth] Jan 14 06:29:42 host sshd[4205]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:29:42 host sshd[4205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.136 Jan 14 06:29:44 host sshd[4205]: Failed password for invalid user centor from 210.245.92.136 port 53300 ssh2 Jan 14 06:29:45 host sshd[4205]: Received disconnect from 210.245.92.136 port 53300:11: Bye Bye [preauth] Jan 14 06:29:45 host sshd[4205]: Disconnected from 210.245.92.136 port 53300 [preauth] Jan 14 06:30:09 host sshd[4270]: Invalid user ceshi from 86.57.237.202 port 56460 Jan 14 06:30:09 host sshd[4270]: input_userauth_request: invalid user ceshi [preauth] Jan 14 06:30:09 host sshd[4270]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:30:09 host sshd[4270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.57.237.202 Jan 14 06:30:11 host sshd[4270]: Failed password for invalid user ceshi from 86.57.237.202 port 56460 ssh2 Jan 14 06:30:11 host sshd[4270]: Received disconnect from 86.57.237.202 port 56460:11: Bye Bye [preauth] Jan 14 06:30:11 host sshd[4270]: Disconnected from 86.57.237.202 port 56460 [preauth] Jan 14 06:30:55 host sshd[4402]: User root from 43.155.95.97 not allowed because not listed in AllowUsers Jan 14 06:30:55 host sshd[4402]: input_userauth_request: invalid user root [preauth] Jan 14 06:30:55 host unix_chkpwd[4406]: password check failed for user (root) Jan 14 06:30:55 host sshd[4402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.95.97 user=root Jan 14 06:30:55 host sshd[4402]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 06:30:58 host sshd[4402]: Failed password for invalid user root from 43.155.95.97 port 54142 ssh2 Jan 14 06:30:58 host sshd[4402]: Received disconnect from 43.155.95.97 port 54142:11: Bye Bye [preauth] Jan 14 06:30:58 host sshd[4402]: Disconnected from 43.155.95.97 port 54142 [preauth] Jan 14 06:31:15 host sshd[4483]: Invalid user zml from 86.57.237.202 port 51232 Jan 14 06:31:15 host sshd[4483]: input_userauth_request: invalid user zml [preauth] Jan 14 06:31:15 host sshd[4483]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:31:15 host sshd[4483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.57.237.202 Jan 14 06:31:17 host sshd[4483]: Failed password for invalid user zml from 86.57.237.202 port 51232 ssh2 Jan 14 06:31:27 host sshd[4551]: Invalid user qinxu from 210.245.92.136 port 60874 Jan 14 06:31:27 host sshd[4551]: input_userauth_request: invalid user qinxu [preauth] Jan 14 06:31:27 host sshd[4551]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:31:27 host sshd[4551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.136 Jan 14 06:31:29 host sshd[4551]: Failed password for invalid user qinxu from 210.245.92.136 port 60874 ssh2 Jan 14 06:31:30 host sshd[4551]: Received disconnect from 210.245.92.136 port 60874:11: Bye Bye [preauth] Jan 14 06:31:30 host sshd[4551]: Disconnected from 210.245.92.136 port 60874 [preauth] Jan 14 06:32:52 host sshd[4845]: Invalid user bigipuser3 from 220.133.158.34 port 46324 Jan 14 06:32:52 host sshd[4845]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 14 06:32:52 host sshd[4845]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:32:52 host sshd[4845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.158.34 Jan 14 06:32:54 host sshd[4845]: Failed password for invalid user bigipuser3 from 220.133.158.34 port 46324 ssh2 Jan 14 06:32:55 host sshd[4845]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:32:57 host sshd[4845]: Failed password for invalid user bigipuser3 from 220.133.158.34 port 46324 ssh2 Jan 14 06:32:57 host sshd[4845]: Connection reset by 220.133.158.34 port 46324 [preauth] Jan 14 06:32:57 host sshd[4845]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.158.34 Jan 14 06:35:24 host sshd[5344]: Connection closed by 201.32.178.190 port 51526 [preauth] Jan 14 06:39:12 host sshd[5885]: Connection closed by 201.32.178.190 port 36296 [preauth] Jan 14 06:42:24 host sshd[6539]: Connection reset by 201.32.178.190 port 49296 [preauth] Jan 14 06:49:26 host sshd[7561]: Connection closed by 201.32.178.190 port 47065 [preauth] Jan 14 06:52:40 host sshd[8275]: Invalid user ubnt from 176.111.173.164 port 57088 Jan 14 06:52:40 host sshd[8275]: input_userauth_request: invalid user ubnt [preauth] Jan 14 06:52:40 host sshd[8275]: Failed none for invalid user ubnt from 176.111.173.164 port 57088 ssh2 Jan 14 06:52:43 host sshd[8275]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:52:43 host sshd[8275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.111.173.164 Jan 14 06:52:45 host sshd[8275]: Failed password for invalid user ubnt from 176.111.173.164 port 57088 ssh2 Jan 14 06:52:48 host sshd[8275]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:52:50 host sshd[8275]: Failed password for invalid user ubnt from 176.111.173.164 port 57088 ssh2 Jan 14 06:52:53 host sshd[8275]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:52:55 host sshd[8275]: Failed password for invalid user ubnt from 176.111.173.164 port 57088 ssh2 Jan 14 06:52:58 host sshd[8275]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:53:00 host sshd[8275]: Failed password for invalid user ubnt from 176.111.173.164 port 57088 ssh2 Jan 14 06:53:13 host sshd[8312]: Connection closed by 201.32.178.190 port 60068 [preauth] Jan 14 06:56:29 host sshd[9106]: Connection reset by 201.32.178.190 port 44835 [preauth] Jan 14 06:59:22 host sshd[9775]: Invalid user admin from 118.37.94.6 port 62887 Jan 14 06:59:22 host sshd[9775]: input_userauth_request: invalid user admin [preauth] Jan 14 06:59:22 host sshd[9775]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:59:22 host sshd[9775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.37.94.6 Jan 14 06:59:24 host sshd[9775]: Failed password for invalid user admin from 118.37.94.6 port 62887 ssh2 Jan 14 06:59:25 host sshd[9775]: Failed password for invalid user admin from 118.37.94.6 port 62887 ssh2 Jan 14 06:59:25 host sshd[9775]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:59:27 host sshd[9775]: Failed password for invalid user admin from 118.37.94.6 port 62887 ssh2 Jan 14 06:59:28 host sshd[9775]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:59:30 host sshd[9775]: Failed password for invalid user admin from 118.37.94.6 port 62887 ssh2 Jan 14 06:59:31 host sshd[9775]: pam_unix(sshd:auth): check pass; user unknown Jan 14 06:59:33 host sshd[9775]: Failed password for invalid user admin from 118.37.94.6 port 62887 ssh2 Jan 14 06:59:55 host sshd[9902]: Connection closed by 201.32.178.190 port 57836 [preauth] Jan 14 07:00:31 host sshd[10072]: Invalid user telnet from 211.55.192.45 port 60462 Jan 14 07:00:31 host sshd[10072]: input_userauth_request: invalid user telnet [preauth] Jan 14 07:00:31 host sshd[10072]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:00:31 host sshd[10072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.55.192.45 Jan 14 07:00:33 host sshd[10072]: Failed password for invalid user telnet from 211.55.192.45 port 60462 ssh2 Jan 14 07:00:34 host sshd[10072]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:00:36 host sshd[10072]: Failed password for invalid user telnet from 211.55.192.45 port 60462 ssh2 Jan 14 07:00:36 host sshd[10072]: Connection reset by 211.55.192.45 port 60462 [preauth] Jan 14 07:00:36 host sshd[10072]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.55.192.45 Jan 14 07:03:27 host sshd[10727]: Connection reset by 201.32.178.190 port 42605 [preauth] Jan 14 07:06:10 host sshd[11321]: Invalid user ubnt from 46.139.7.158 port 39120 Jan 14 07:06:10 host sshd[11321]: input_userauth_request: invalid user ubnt [preauth] Jan 14 07:06:10 host sshd[11321]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:06:10 host sshd[11321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.139.7.158 Jan 14 07:06:13 host sshd[11321]: Failed password for invalid user ubnt from 46.139.7.158 port 39120 ssh2 Jan 14 07:06:13 host sshd[11321]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:06:15 host sshd[11321]: Failed password for invalid user ubnt from 46.139.7.158 port 39120 ssh2 Jan 14 07:06:16 host sshd[11321]: Failed password for invalid user ubnt from 46.139.7.158 port 39120 ssh2 Jan 14 07:06:17 host sshd[11321]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:06:19 host sshd[11321]: Failed password for invalid user ubnt from 46.139.7.158 port 39120 ssh2 Jan 14 07:06:20 host sshd[11321]: Connection reset by 46.139.7.158 port 39120 [preauth] Jan 14 07:06:20 host sshd[11321]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.139.7.158 Jan 14 07:06:54 host sshd[11481]: Connection closed by 201.32.178.190 port 55606 [preauth] Jan 14 07:10:28 host sshd[12279]: Connection reset by 201.32.178.190 port 40375 [preauth] Jan 14 07:14:02 host sshd[13102]: Connection reset by 201.32.178.190 port 53377 [preauth] Jan 14 07:17:33 host sshd[13810]: Connection closed by 201.32.178.190 port 38145 [preauth] Jan 14 07:19:42 host sshd[14241]: Invalid user ec2-user from 196.218.12.106 port 50147 Jan 14 07:19:42 host sshd[14241]: input_userauth_request: invalid user ec2-user [preauth] Jan 14 07:19:42 host sshd[14241]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:19:42 host sshd[14241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.218.12.106 Jan 14 07:19:44 host sshd[14241]: Failed password for invalid user ec2-user from 196.218.12.106 port 50147 ssh2 Jan 14 07:19:45 host sshd[14241]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:19:46 host sshd[14241]: Failed password for invalid user ec2-user from 196.218.12.106 port 50147 ssh2 Jan 14 07:19:47 host sshd[14241]: Connection reset by 196.218.12.106 port 50147 [preauth] Jan 14 07:19:47 host sshd[14241]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.218.12.106 Jan 14 07:19:55 host sshd[14254]: Invalid user admin from 125.228.59.116 port 49149 Jan 14 07:19:55 host sshd[14254]: input_userauth_request: invalid user admin [preauth] Jan 14 07:19:55 host sshd[14254]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:19:55 host sshd[14254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.59.116 Jan 14 07:19:57 host sshd[14254]: Failed password for invalid user admin from 125.228.59.116 port 49149 ssh2 Jan 14 07:19:58 host sshd[14254]: Failed password for invalid user admin from 125.228.59.116 port 49149 ssh2 Jan 14 07:20:00 host sshd[14254]: Connection reset by 125.228.59.116 port 49149 [preauth] Jan 14 07:21:10 host sshd[14421]: Connection closed by 201.32.178.190 port 51148 [preauth] Jan 14 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 07:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 07:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwresourcehunte user-3=keralaholi user-4=wwwrmswll user-5=ugotscom user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=wwwnexidigital user-17=mrsclean user-18=palco123 user-19=gifterman user-20=phmetals user-21=kottayamcalldriv user-22=wwwkapin user-23=woodpeck user-24=wwwkmaorg user-25=disposeat user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=shalinijames user-30=wwwtestugo feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 07:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 07:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QMzv38bkLloJ9tji.~ Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QMzv38bkLloJ9tji.~' Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QMzv38bkLloJ9tji.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 07:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 07:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 07:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 07:24:26 host sshd[15126]: Invalid user admin from 203.74.132.76 port 53318 Jan 14 07:24:26 host sshd[15126]: input_userauth_request: invalid user admin [preauth] Jan 14 07:24:26 host sshd[15126]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:24:26 host sshd[15126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.74.132.76 Jan 14 07:24:29 host sshd[15126]: Failed password for invalid user admin from 203.74.132.76 port 53318 ssh2 Jan 14 07:24:29 host sshd[15126]: Failed password for invalid user admin from 203.74.132.76 port 53318 ssh2 Jan 14 07:24:29 host sshd[15126]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:24:31 host sshd[15126]: Failed password for invalid user admin from 203.74.132.76 port 53318 ssh2 Jan 14 07:24:32 host sshd[15126]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:24:34 host sshd[15126]: Failed password for invalid user admin from 203.74.132.76 port 53318 ssh2 Jan 14 07:24:35 host sshd[15126]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:24:36 host sshd[15126]: Failed password for invalid user admin from 203.74.132.76 port 53318 ssh2 Jan 14 07:24:37 host sshd[15126]: Connection reset by 203.74.132.76 port 53318 [preauth] Jan 14 07:24:37 host sshd[15126]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.74.132.76 Jan 14 07:24:37 host sshd[15126]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 14 07:24:43 host sshd[15163]: Connection closed by 201.32.178.190 port 35916 [preauth] Jan 14 07:28:11 host sshd[15630]: Connection closed by 201.32.178.190 port 48917 [preauth] Jan 14 07:29:54 host sshd[15830]: Invalid user vadmin from 218.161.99.50 port 34154 Jan 14 07:29:54 host sshd[15830]: input_userauth_request: invalid user vadmin [preauth] Jan 14 07:29:54 host sshd[15830]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:29:54 host sshd[15830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.161.99.50 Jan 14 07:29:56 host sshd[15830]: Failed password for invalid user vadmin from 218.161.99.50 port 34154 ssh2 Jan 14 07:29:57 host sshd[15830]: Connection reset by 218.161.99.50 port 34154 [preauth] Jan 14 07:31:42 host sshd[16146]: Did not receive identification string from 201.32.178.190 port 33685 Jan 14 07:32:32 host sshd[16253]: Invalid user pi from 72.24.32.86 port 41985 Jan 14 07:32:32 host sshd[16253]: input_userauth_request: invalid user pi [preauth] Jan 14 07:32:32 host sshd[16253]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:32:32 host sshd[16253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.24.32.86 Jan 14 07:32:34 host sshd[16253]: Failed password for invalid user pi from 72.24.32.86 port 41985 ssh2 Jan 14 07:32:35 host sshd[16253]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:32:37 host sshd[16253]: Failed password for invalid user pi from 72.24.32.86 port 41985 ssh2 Jan 14 07:32:38 host sshd[16253]: Connection reset by 72.24.32.86 port 41985 [preauth] Jan 14 07:32:38 host sshd[16253]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.24.32.86 Jan 14 07:33:02 host sshd[16286]: User root from 122.117.215.93 not allowed because not listed in AllowUsers Jan 14 07:33:02 host sshd[16286]: input_userauth_request: invalid user root [preauth] Jan 14 07:33:02 host unix_chkpwd[16300]: password check failed for user (root) Jan 14 07:33:02 host sshd[16286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.215.93 user=root Jan 14 07:33:02 host sshd[16286]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 07:33:03 host sshd[16286]: Failed password for invalid user root from 122.117.215.93 port 34929 ssh2 Jan 14 07:33:05 host unix_chkpwd[16305]: password check failed for user (root) Jan 14 07:33:05 host sshd[16286]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 07:33:06 host sshd[16286]: Failed password for invalid user root from 122.117.215.93 port 34929 ssh2 Jan 14 07:33:08 host unix_chkpwd[16309]: password check failed for user (root) Jan 14 07:33:08 host sshd[16286]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 07:33:10 host sshd[16286]: Failed password for invalid user root from 122.117.215.93 port 34929 ssh2 Jan 14 07:33:10 host sshd[16286]: Connection reset by 122.117.215.93 port 34929 [preauth] Jan 14 07:33:10 host sshd[16286]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.215.93 user=root Jan 14 07:35:23 host sshd[16677]: Connection closed by 201.32.178.190 port 46686 [preauth] Jan 14 07:38:55 host sshd[17165]: Connection closed by 201.32.178.190 port 59687 [preauth] Jan 14 07:42:08 host sshd[17625]: Connection reset by 201.32.178.190 port 44455 [preauth] Jan 14 07:44:08 host sshd[17871]: Invalid user nexidigital from 159.89.185.234 port 56104 Jan 14 07:44:08 host sshd[17871]: input_userauth_request: invalid user nexidigital [preauth] Jan 14 07:44:08 host sshd[17871]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:44:08 host sshd[17871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 14 07:44:10 host sshd[17871]: Failed password for invalid user nexidigital from 159.89.185.234 port 56104 ssh2 Jan 14 07:44:11 host sshd[17871]: Connection closed by 159.89.185.234 port 56104 [preauth] Jan 14 07:45:47 host sshd[18180]: Connection reset by 201.32.178.190 port 57456 [preauth] Jan 14 07:47:03 host sshd[18383]: User root from 188.9.116.17 not allowed because not listed in AllowUsers Jan 14 07:47:03 host sshd[18383]: input_userauth_request: invalid user root [preauth] Jan 14 07:47:03 host unix_chkpwd[18386]: password check failed for user (root) Jan 14 07:47:03 host sshd[18383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.9.116.17 user=root Jan 14 07:47:03 host sshd[18383]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 07:47:05 host sshd[18383]: Failed password for invalid user root from 188.9.116.17 port 42791 ssh2 Jan 14 07:47:05 host sshd[18383]: Received disconnect from 188.9.116.17 port 42791:11: Bye Bye [preauth] Jan 14 07:47:05 host sshd[18383]: Disconnected from 188.9.116.17 port 42791 [preauth] Jan 14 07:47:06 host sshd[18391]: User root from 188.9.116.17 not allowed because not listed in AllowUsers Jan 14 07:47:06 host sshd[18391]: input_userauth_request: invalid user root [preauth] Jan 14 07:47:06 host unix_chkpwd[18394]: password check failed for user (root) Jan 14 07:47:06 host sshd[18391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.9.116.17 user=root Jan 14 07:47:06 host sshd[18391]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 07:47:08 host sshd[18391]: Failed password for invalid user root from 188.9.116.17 port 42823 ssh2 Jan 14 07:47:09 host sshd[18391]: Received disconnect from 188.9.116.17 port 42823:11: Bye Bye [preauth] Jan 14 07:47:09 host sshd[18391]: Disconnected from 188.9.116.17 port 42823 [preauth] Jan 14 07:47:10 host sshd[18404]: Invalid user ubnt from 188.9.116.17 port 42843 Jan 14 07:47:10 host sshd[18404]: input_userauth_request: invalid user ubnt [preauth] Jan 14 07:47:10 host sshd[18404]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:47:10 host sshd[18404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.9.116.17 Jan 14 07:47:12 host sshd[18404]: Failed password for invalid user ubnt from 188.9.116.17 port 42843 ssh2 Jan 14 07:49:10 host sshd[18668]: Connection reset by 201.32.178.190 port 42224 [preauth] Jan 14 07:52:48 host sshd[19201]: Connection reset by 201.32.178.190 port 55226 [preauth] Jan 14 07:55:45 host sshd[19528]: Connection reset by 121.157.206.13 port 60709 [preauth] Jan 14 07:56:16 host sshd[19568]: Connection reset by 201.32.178.190 port 39995 [preauth] Jan 14 07:58:50 host sshd[19971]: Invalid user chris from 107.189.30.59 port 46104 Jan 14 07:58:50 host sshd[19971]: input_userauth_request: invalid user chris [preauth] Jan 14 07:58:50 host sshd[19971]: pam_unix(sshd:auth): check pass; user unknown Jan 14 07:58:50 host sshd[19971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 14 07:58:52 host sshd[19971]: Failed password for invalid user chris from 107.189.30.59 port 46104 ssh2 Jan 14 07:58:54 host sshd[19971]: Connection closed by 107.189.30.59 port 46104 [preauth] Jan 14 07:59:44 host sshd[20059]: Did not receive identification string from 201.32.178.190 port 52996 Jan 14 08:02:06 host sshd[20475]: Invalid user ubnt from 138.117.103.3 port 57783 Jan 14 08:02:06 host sshd[20475]: input_userauth_request: invalid user ubnt [preauth] Jan 14 08:02:06 host sshd[20475]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:02:06 host sshd[20475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.103.3 Jan 14 08:02:08 host sshd[20475]: Failed password for invalid user ubnt from 138.117.103.3 port 57783 ssh2 Jan 14 08:02:09 host sshd[20475]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:02:11 host sshd[20475]: Failed password for invalid user ubnt from 138.117.103.3 port 57783 ssh2 Jan 14 08:02:12 host sshd[20475]: Failed password for invalid user ubnt from 138.117.103.3 port 57783 ssh2 Jan 14 08:02:13 host sshd[20475]: Connection reset by 138.117.103.3 port 57783 [preauth] Jan 14 08:02:13 host sshd[20475]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.103.3 Jan 14 08:03:18 host sshd[20585]: Connection reset by 201.32.178.190 port 37763 [preauth] Jan 14 08:06:40 host sshd[21082]: Connection reset by 201.32.178.190 port 50764 [preauth] Jan 14 08:10:22 host sshd[21592]: Connection closed by 201.32.178.190 port 35532 [preauth] Jan 14 08:13:49 host sshd[22166]: Did not receive identification string from 201.32.178.190 port 48534 Jan 14 08:13:49 host sshd[22164]: Invalid user admin from 114.33.53.209 port 34568 Jan 14 08:13:49 host sshd[22164]: input_userauth_request: invalid user admin [preauth] Jan 14 08:13:49 host sshd[22164]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:13:49 host sshd[22164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.53.209 Jan 14 08:13:51 host sshd[22164]: Failed password for invalid user admin from 114.33.53.209 port 34568 ssh2 Jan 14 08:13:52 host sshd[22164]: Failed password for invalid user admin from 114.33.53.209 port 34568 ssh2 Jan 14 08:13:52 host sshd[22164]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:13:54 host sshd[22164]: Failed password for invalid user admin from 114.33.53.209 port 34568 ssh2 Jan 14 08:13:55 host sshd[22164]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:13:57 host sshd[22164]: Failed password for invalid user admin from 114.33.53.209 port 34568 ssh2 Jan 14 08:13:57 host sshd[22164]: Connection reset by 114.33.53.209 port 34568 [preauth] Jan 14 08:13:57 host sshd[22164]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.53.209 Jan 14 08:14:03 host sshd[22246]: Invalid user pi from 151.26.72.254 port 33019 Jan 14 08:14:03 host sshd[22246]: input_userauth_request: invalid user pi [preauth] Jan 14 08:14:03 host sshd[22246]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:14:03 host sshd[22246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.26.72.254 Jan 14 08:14:06 host sshd[22246]: Failed password for invalid user pi from 151.26.72.254 port 33019 ssh2 Jan 14 08:14:06 host sshd[22246]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:14:08 host sshd[22246]: Failed password for invalid user pi from 151.26.72.254 port 33019 ssh2 Jan 14 08:14:09 host sshd[22246]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:14:11 host sshd[22246]: Failed password for invalid user pi from 151.26.72.254 port 33019 ssh2 Jan 14 08:14:12 host sshd[22246]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:14:15 host sshd[22246]: Failed password for invalid user pi from 151.26.72.254 port 33019 ssh2 Jan 14 08:14:15 host sshd[22246]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:14:17 host sshd[22246]: Failed password for invalid user pi from 151.26.72.254 port 33019 ssh2 Jan 14 08:19:06 host sshd[23005]: Invalid user dv from 194.110.203.109 port 57438 Jan 14 08:19:06 host sshd[23005]: input_userauth_request: invalid user dv [preauth] Jan 14 08:19:06 host sshd[23005]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:19:06 host sshd[23005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 08:19:08 host sshd[23005]: Failed password for invalid user dv from 194.110.203.109 port 57438 ssh2 Jan 14 08:19:11 host sshd[23020]: User root from 220.132.238.70 not allowed because not listed in AllowUsers Jan 14 08:19:11 host sshd[23020]: input_userauth_request: invalid user root [preauth] Jan 14 08:19:11 host unix_chkpwd[23024]: password check failed for user (root) Jan 14 08:19:11 host sshd[23020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.238.70 user=root Jan 14 08:19:11 host sshd[23020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 08:19:12 host sshd[23005]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:19:13 host sshd[23020]: Failed password for invalid user root from 220.132.238.70 port 47802 ssh2 Jan 14 08:19:14 host sshd[23005]: Failed password for invalid user dv from 194.110.203.109 port 57438 ssh2 Jan 14 08:19:14 host unix_chkpwd[23028]: password check failed for user (root) Jan 14 08:19:14 host sshd[23020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 08:19:16 host sshd[23020]: Failed password for invalid user root from 220.132.238.70 port 47802 ssh2 Jan 14 08:19:17 host unix_chkpwd[23031]: password check failed for user (root) Jan 14 08:19:17 host sshd[23020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 08:19:17 host sshd[23005]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:19:19 host sshd[23020]: Failed password for invalid user root from 220.132.238.70 port 47802 ssh2 Jan 14 08:19:19 host sshd[23005]: Failed password for invalid user dv from 194.110.203.109 port 57438 ssh2 Jan 14 08:19:20 host unix_chkpwd[23042]: password check failed for user (root) Jan 14 08:19:20 host sshd[23020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 08:19:22 host sshd[23005]: Connection closed by 194.110.203.109 port 57438 [preauth] Jan 14 08:19:22 host sshd[23005]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 08:19:22 host sshd[23020]: Failed password for invalid user root from 220.132.238.70 port 47802 ssh2 Jan 14 08:20:34 host sshd[23277]: Invalid user client from 195.226.194.242 port 17440 Jan 14 08:20:34 host sshd[23277]: input_userauth_request: invalid user client [preauth] Jan 14 08:20:35 host sshd[23277]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:20:35 host sshd[23277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 14 08:20:37 host sshd[23277]: Failed password for invalid user client from 195.226.194.242 port 17440 ssh2 Jan 14 08:20:37 host sshd[23277]: Received disconnect from 195.226.194.242 port 17440:11: Bye Bye [preauth] Jan 14 08:20:37 host sshd[23277]: Disconnected from 195.226.194.242 port 17440 [preauth] Jan 14 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=wwwnexidigital user-22=mrsclean user-23=kottayamcalldriv user-24=phmetals user-25=palco123 user-26=gifterman user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 08:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EVXYiyzjdKOW8THE.~ Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EVXYiyzjdKOW8THE.~' Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EVXYiyzjdKOW8THE.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 08:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 08:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 08:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 08:27:16 host sshd[24409]: Invalid user arthur from 209.141.56.48 port 52810 Jan 14 08:27:16 host sshd[24409]: input_userauth_request: invalid user arthur [preauth] Jan 14 08:27:16 host sshd[24409]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:27:16 host sshd[24409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 14 08:27:19 host sshd[24409]: Failed password for invalid user arthur from 209.141.56.48 port 52810 ssh2 Jan 14 08:27:20 host sshd[24409]: Connection closed by 209.141.56.48 port 52810 [preauth] Jan 14 08:31:19 host sshd[25030]: Invalid user arthur from 209.141.56.48 port 38142 Jan 14 08:31:19 host sshd[25030]: input_userauth_request: invalid user arthur [preauth] Jan 14 08:31:19 host sshd[25030]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:31:19 host sshd[25030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 14 08:31:21 host sshd[25030]: Failed password for invalid user arthur from 209.141.56.48 port 38142 ssh2 Jan 14 08:31:21 host sshd[25030]: Connection closed by 209.141.56.48 port 38142 [preauth] Jan 14 08:31:36 host sshd[25072]: User root from 14.44.53.200 not allowed because not listed in AllowUsers Jan 14 08:31:36 host sshd[25072]: input_userauth_request: invalid user root [preauth] Jan 14 08:31:36 host unix_chkpwd[25077]: password check failed for user (root) Jan 14 08:31:36 host sshd[25072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.44.53.200 user=root Jan 14 08:31:36 host sshd[25072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 08:31:38 host sshd[25072]: Failed password for invalid user root from 14.44.53.200 port 49433 ssh2 Jan 14 08:31:38 host unix_chkpwd[25080]: password check failed for user (root) Jan 14 08:31:38 host sshd[25072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 08:31:41 host sshd[25072]: Failed password for invalid user root from 14.44.53.200 port 49433 ssh2 Jan 14 08:35:11 host sshd[25505]: Invalid user pi from 62.215.91.32 port 35160 Jan 14 08:35:11 host sshd[25505]: input_userauth_request: invalid user pi [preauth] Jan 14 08:35:11 host sshd[25506]: Invalid user pi from 62.215.91.32 port 35164 Jan 14 08:35:11 host sshd[25506]: input_userauth_request: invalid user pi [preauth] Jan 14 08:35:11 host sshd[25505]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:35:11 host sshd[25505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.215.91.32 Jan 14 08:35:11 host sshd[25506]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:35:11 host sshd[25506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.215.91.32 Jan 14 08:35:12 host sshd[25505]: Failed password for invalid user pi from 62.215.91.32 port 35160 ssh2 Jan 14 08:35:12 host sshd[25506]: Failed password for invalid user pi from 62.215.91.32 port 35164 ssh2 Jan 14 08:35:13 host sshd[25505]: Connection closed by 62.215.91.32 port 35160 [preauth] Jan 14 08:35:13 host sshd[25506]: Connection closed by 62.215.91.32 port 35164 [preauth] Jan 14 08:47:40 host sshd[27517]: Bad protocol version identification 'GET / HTTP/1.1' from 182.162.17.171 port 45176 Jan 14 08:47:41 host sshd[27519]: User root from 182.162.17.171 not allowed because not listed in AllowUsers Jan 14 08:47:41 host sshd[27519]: input_userauth_request: invalid user root [preauth] Jan 14 08:47:42 host unix_chkpwd[27524]: password check failed for user (root) Jan 14 08:47:42 host sshd[27519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.17.171 user=root Jan 14 08:47:42 host sshd[27519]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 08:47:44 host sshd[27519]: Failed password for invalid user root from 182.162.17.171 port 45368 ssh2 Jan 14 08:47:44 host sshd[27519]: Connection closed by 182.162.17.171 port 45368 [preauth] Jan 14 08:47:45 host sshd[27527]: User root from 182.162.17.171 not allowed because not listed in AllowUsers Jan 14 08:47:45 host sshd[27527]: input_userauth_request: invalid user root [preauth] Jan 14 08:47:46 host unix_chkpwd[27538]: password check failed for user (root) Jan 14 08:47:46 host sshd[27527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.17.171 user=root Jan 14 08:47:46 host sshd[27527]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 08:47:48 host sshd[27527]: Failed password for invalid user root from 182.162.17.171 port 46694 ssh2 Jan 14 08:51:02 host sshd[28287]: Invalid user admin from 195.226.194.242 port 35868 Jan 14 08:51:02 host sshd[28287]: input_userauth_request: invalid user admin [preauth] Jan 14 08:51:03 host sshd[28287]: pam_unix(sshd:auth): check pass; user unknown Jan 14 08:51:03 host sshd[28287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 14 08:51:05 host sshd[28287]: Failed password for invalid user admin from 195.226.194.242 port 35868 ssh2 Jan 14 08:51:05 host sshd[28287]: Received disconnect from 195.226.194.242 port 35868:11: Bye Bye [preauth] Jan 14 08:51:05 host sshd[28287]: Disconnected from 195.226.194.242 port 35868 [preauth] Jan 14 09:01:31 host sshd[29806]: Invalid user arthur from 209.141.56.48 port 42968 Jan 14 09:01:31 host sshd[29806]: input_userauth_request: invalid user arthur [preauth] Jan 14 09:01:31 host sshd[29806]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:01:31 host sshd[29806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 14 09:01:32 host sshd[29806]: Failed password for invalid user arthur from 209.141.56.48 port 42968 ssh2 Jan 14 09:05:38 host sshd[30452]: User root from 59.127.235.140 not allowed because not listed in AllowUsers Jan 14 09:05:38 host sshd[30452]: input_userauth_request: invalid user root [preauth] Jan 14 09:05:38 host unix_chkpwd[30456]: password check failed for user (root) Jan 14 09:05:38 host sshd[30452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.235.140 user=root Jan 14 09:05:38 host sshd[30452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:05:41 host sshd[30452]: Failed password for invalid user root from 59.127.235.140 port 60254 ssh2 Jan 14 09:05:42 host unix_chkpwd[30467]: password check failed for user (root) Jan 14 09:05:42 host sshd[30452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:05:44 host sshd[30452]: Failed password for invalid user root from 59.127.235.140 port 60254 ssh2 Jan 14 09:05:46 host unix_chkpwd[30474]: password check failed for user (root) Jan 14 09:05:46 host sshd[30452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:05:47 host sshd[30452]: Failed password for invalid user root from 59.127.235.140 port 60254 ssh2 Jan 14 09:05:48 host unix_chkpwd[30476]: password check failed for user (root) Jan 14 09:05:48 host sshd[30452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:05:49 host sshd[30452]: Failed password for invalid user root from 59.127.235.140 port 60254 ssh2 Jan 14 09:05:50 host unix_chkpwd[30479]: password check failed for user (root) Jan 14 09:05:50 host sshd[30452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:05:53 host sshd[30452]: Failed password for invalid user root from 59.127.235.140 port 60254 ssh2 Jan 14 09:06:31 host sshd[30618]: Invalid user nexidigital from 159.89.185.234 port 50498 Jan 14 09:06:31 host sshd[30618]: input_userauth_request: invalid user nexidigital [preauth] Jan 14 09:06:31 host sshd[30618]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:06:31 host sshd[30618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.185.234 Jan 14 09:06:33 host sshd[30618]: Failed password for invalid user nexidigital from 159.89.185.234 port 50498 ssh2 Jan 14 09:06:34 host sshd[30618]: Connection closed by 159.89.185.234 port 50498 [preauth] Jan 14 09:14:24 host sshd[31697]: Connection reset by 86.209.254.39 port 40064 [preauth] Jan 14 09:16:46 host sshd[32029]: User centos from 161.35.211.137 not allowed because not listed in AllowUsers Jan 14 09:16:46 host sshd[32029]: input_userauth_request: invalid user centos [preauth] Jan 14 09:16:46 host unix_chkpwd[32033]: password check failed for user (centos) Jan 14 09:16:46 host sshd[32029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.211.137 user=centos Jan 14 09:16:48 host sshd[32029]: Failed password for invalid user centos from 161.35.211.137 port 34926 ssh2 Jan 14 09:16:48 host sshd[32029]: Received disconnect from 161.35.211.137 port 34926:11: Bye Bye [preauth] Jan 14 09:16:48 host sshd[32029]: Disconnected from 161.35.211.137 port 34926 [preauth] Jan 14 09:17:04 host sshd[32064]: User root from 38.54.14.54 not allowed because not listed in AllowUsers Jan 14 09:17:04 host sshd[32064]: input_userauth_request: invalid user root [preauth] Jan 14 09:17:04 host unix_chkpwd[32066]: password check failed for user (root) Jan 14 09:17:04 host sshd[32064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.14.54 user=root Jan 14 09:17:04 host sshd[32064]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:17:05 host sshd[32064]: Failed password for invalid user root from 38.54.14.54 port 36688 ssh2 Jan 14 09:17:05 host sshd[32064]: Received disconnect from 38.54.14.54 port 36688:11: Bye Bye [preauth] Jan 14 09:17:05 host sshd[32064]: Disconnected from 38.54.14.54 port 36688 [preauth] Jan 14 09:17:06 host sshd[32068]: Invalid user test5 from 190.188.217.230 port 52472 Jan 14 09:17:06 host sshd[32068]: input_userauth_request: invalid user test5 [preauth] Jan 14 09:17:06 host sshd[32068]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:17:06 host sshd[32068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.188.217.230 Jan 14 09:17:08 host sshd[32068]: Failed password for invalid user test5 from 190.188.217.230 port 52472 ssh2 Jan 14 09:17:09 host sshd[32068]: Received disconnect from 190.188.217.230 port 52472:11: Bye Bye [preauth] Jan 14 09:17:09 host sshd[32068]: Disconnected from 190.188.217.230 port 52472 [preauth] Jan 14 09:17:13 host sshd[32076]: Invalid user sde from 14.128.42.126 port 51606 Jan 14 09:17:13 host sshd[32076]: input_userauth_request: invalid user sde [preauth] Jan 14 09:17:13 host sshd[32076]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:17:13 host sshd[32076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.128.42.126 Jan 14 09:17:15 host sshd[32076]: Failed password for invalid user sde from 14.128.42.126 port 51606 ssh2 Jan 14 09:17:15 host sshd[32076]: Received disconnect from 14.128.42.126 port 51606:11: Bye Bye [preauth] Jan 14 09:17:15 host sshd[32076]: Disconnected from 14.128.42.126 port 51606 [preauth] Jan 14 09:17:56 host sshd[32144]: Invalid user PlcmSpIp from 194.204.194.11 port 45436 Jan 14 09:17:56 host sshd[32144]: input_userauth_request: invalid user PlcmSpIp [preauth] Jan 14 09:17:56 host sshd[32144]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:17:56 host sshd[32144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 Jan 14 09:17:58 host sshd[32144]: Failed password for invalid user PlcmSpIp from 194.204.194.11 port 45436 ssh2 Jan 14 09:17:59 host sshd[32144]: Received disconnect from 194.204.194.11 port 45436:11: Bye Bye [preauth] Jan 14 09:17:59 host sshd[32144]: Disconnected from 194.204.194.11 port 45436 [preauth] Jan 14 09:18:24 host sshd[32190]: User root from 180.64.32.124 not allowed because not listed in AllowUsers Jan 14 09:18:24 host sshd[32190]: input_userauth_request: invalid user root [preauth] Jan 14 09:18:24 host unix_chkpwd[32193]: password check failed for user (root) Jan 14 09:18:24 host sshd[32190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.64.32.124 user=root Jan 14 09:18:24 host sshd[32190]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:18:26 host sshd[32190]: Failed password for invalid user root from 180.64.32.124 port 61873 ssh2 Jan 14 09:18:26 host sshd[32190]: Connection reset by 180.64.32.124 port 61873 [preauth] Jan 14 09:18:43 host sshd[32232]: User centos from 186.67.248.6 not allowed because not listed in AllowUsers Jan 14 09:18:43 host sshd[32232]: input_userauth_request: invalid user centos [preauth] Jan 14 09:18:43 host unix_chkpwd[32235]: password check failed for user (centos) Jan 14 09:18:43 host sshd[32232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.6 user=centos Jan 14 09:18:45 host sshd[32232]: Failed password for invalid user centos from 186.67.248.6 port 45030 ssh2 Jan 14 09:18:46 host sshd[32232]: Received disconnect from 186.67.248.6 port 45030:11: Bye Bye [preauth] Jan 14 09:18:46 host sshd[32232]: Disconnected from 186.67.248.6 port 45030 [preauth] Jan 14 09:19:48 host sshd[32242]: Connection closed by 101.33.80.197 port 53232 [preauth] Jan 14 09:20:57 host sshd[32628]: Invalid user zzding from 179.27.60.34 port 18952 Jan 14 09:20:57 host sshd[32628]: input_userauth_request: invalid user zzding [preauth] Jan 14 09:20:57 host sshd[32628]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:20:57 host sshd[32628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 Jan 14 09:20:58 host sshd[32633]: Invalid user widgets from 154.221.26.62 port 50102 Jan 14 09:20:58 host sshd[32633]: input_userauth_request: invalid user widgets [preauth] Jan 14 09:20:58 host sshd[32633]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:20:58 host sshd[32633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.26.62 Jan 14 09:20:58 host sshd[32628]: Failed password for invalid user zzding from 179.27.60.34 port 18952 ssh2 Jan 14 09:20:59 host sshd[32628]: Received disconnect from 179.27.60.34 port 18952:11: Bye Bye [preauth] Jan 14 09:20:59 host sshd[32628]: Disconnected from 179.27.60.34 port 18952 [preauth] Jan 14 09:21:00 host sshd[32633]: Failed password for invalid user widgets from 154.221.26.62 port 50102 ssh2 Jan 14 09:21:00 host sshd[32633]: Received disconnect from 154.221.26.62 port 50102:11: Bye Bye [preauth] Jan 14 09:21:00 host sshd[32633]: Disconnected from 154.221.26.62 port 50102 [preauth] Jan 14 09:21:21 host sshd[32664]: Invalid user bedrock from 43.153.12.87 port 60706 Jan 14 09:21:21 host sshd[32664]: input_userauth_request: invalid user bedrock [preauth] Jan 14 09:21:21 host sshd[32664]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:21:21 host sshd[32664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.12.87 Jan 14 09:21:22 host sshd[32664]: Failed password for invalid user bedrock from 43.153.12.87 port 60706 ssh2 Jan 14 09:21:22 host sshd[32664]: Received disconnect from 43.153.12.87 port 60706:11: Bye Bye [preauth] Jan 14 09:21:22 host sshd[32664]: Disconnected from 43.153.12.87 port 60706 [preauth] Jan 14 09:21:58 host sshd[32728]: User root from 95.85.34.53 not allowed because not listed in AllowUsers Jan 14 09:21:58 host sshd[32728]: input_userauth_request: invalid user root [preauth] Jan 14 09:21:58 host unix_chkpwd[32731]: password check failed for user (root) Jan 14 09:21:58 host sshd[32728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.34.53 user=root Jan 14 09:21:58 host sshd[32728]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 09:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:21:59 host sshd[32728]: Failed password for invalid user root from 95.85.34.53 port 42452 ssh2 Jan 14 09:22:00 host sshd[32728]: Received disconnect from 95.85.34.53 port 42452:11: Bye Bye [preauth] Jan 14 09:22:00 host sshd[32728]: Disconnected from 95.85.34.53 port 42452 [preauth] Jan 14 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwtestugo user-2=shalinijames user-3=vfmassets user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=kottayamcalldriv user-11=phmetals user-12=gifterman user-13=palco123 user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 09:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-H9sCOM6gng4RPKgS.~ Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-H9sCOM6gng4RPKgS.~' Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-H9sCOM6gng4RPKgS.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 09:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 09:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 09:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 09:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 09:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 09:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 09:22:07 host sshd[440]: Invalid user liangshuang from 24.185.96.44 port 47050 Jan 14 09:22:07 host sshd[440]: input_userauth_request: invalid user liangshuang [preauth] Jan 14 09:22:07 host sshd[440]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:22:07 host sshd[440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.185.96.44 Jan 14 09:22:10 host sshd[440]: Failed password for invalid user liangshuang from 24.185.96.44 port 47050 ssh2 Jan 14 09:22:10 host sshd[440]: Received disconnect from 24.185.96.44 port 47050:11: Bye Bye [preauth] Jan 14 09:22:10 host sshd[440]: Disconnected from 24.185.96.44 port 47050 [preauth] Jan 14 09:22:28 host sshd[548]: Invalid user guest from 194.204.194.11 port 38686 Jan 14 09:22:28 host sshd[548]: input_userauth_request: invalid user guest [preauth] Jan 14 09:22:28 host sshd[548]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:22:28 host sshd[548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 Jan 14 09:22:30 host sshd[548]: Failed password for invalid user guest from 194.204.194.11 port 38686 ssh2 Jan 14 09:22:30 host sshd[548]: Received disconnect from 194.204.194.11 port 38686:11: Bye Bye [preauth] Jan 14 09:22:30 host sshd[548]: Disconnected from 194.204.194.11 port 38686 [preauth] Jan 14 09:22:33 host sshd[590]: Invalid user aiia from 157.230.36.91 port 38522 Jan 14 09:22:33 host sshd[590]: input_userauth_request: invalid user aiia [preauth] Jan 14 09:22:33 host sshd[590]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:22:33 host sshd[590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.36.91 Jan 14 09:22:35 host sshd[593]: Invalid user aiia from 186.67.248.6 port 42024 Jan 14 09:22:35 host sshd[593]: input_userauth_request: invalid user aiia [preauth] Jan 14 09:22:35 host sshd[593]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:22:35 host sshd[593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.6 Jan 14 09:22:35 host sshd[590]: Failed password for invalid user aiia from 157.230.36.91 port 38522 ssh2 Jan 14 09:22:35 host sshd[590]: Received disconnect from 157.230.36.91 port 38522:11: Bye Bye [preauth] Jan 14 09:22:35 host sshd[590]: Disconnected from 157.230.36.91 port 38522 [preauth] Jan 14 09:22:37 host sshd[593]: Failed password for invalid user aiia from 186.67.248.6 port 42024 ssh2 Jan 14 09:22:37 host sshd[593]: Received disconnect from 186.67.248.6 port 42024:11: Bye Bye [preauth] Jan 14 09:22:37 host sshd[593]: Disconnected from 186.67.248.6 port 42024 [preauth] Jan 14 09:22:43 host sshd[665]: User root from 38.54.14.54 not allowed because not listed in AllowUsers Jan 14 09:22:43 host sshd[665]: input_userauth_request: invalid user root [preauth] Jan 14 09:22:43 host unix_chkpwd[668]: password check failed for user (root) Jan 14 09:22:43 host sshd[665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.14.54 user=root Jan 14 09:22:43 host sshd[665]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:22:45 host sshd[665]: Failed password for invalid user root from 38.54.14.54 port 36216 ssh2 Jan 14 09:22:45 host sshd[665]: Received disconnect from 38.54.14.54 port 36216:11: Bye Bye [preauth] Jan 14 09:22:45 host sshd[665]: Disconnected from 38.54.14.54 port 36216 [preauth] Jan 14 09:22:55 host sshd[711]: Invalid user superyo from 161.35.211.137 port 53934 Jan 14 09:22:55 host sshd[711]: input_userauth_request: invalid user superyo [preauth] Jan 14 09:22:55 host sshd[711]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:22:55 host sshd[711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.211.137 Jan 14 09:22:57 host sshd[711]: Failed password for invalid user superyo from 161.35.211.137 port 53934 ssh2 Jan 14 09:22:57 host sshd[711]: Received disconnect from 161.35.211.137 port 53934:11: Bye Bye [preauth] Jan 14 09:22:57 host sshd[711]: Disconnected from 161.35.211.137 port 53934 [preauth] Jan 14 09:23:20 host sshd[783]: Invalid user aiia from 190.188.217.230 port 53526 Jan 14 09:23:20 host sshd[783]: input_userauth_request: invalid user aiia [preauth] Jan 14 09:23:20 host sshd[783]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:23:20 host sshd[783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.188.217.230 Jan 14 09:23:22 host sshd[783]: Failed password for invalid user aiia from 190.188.217.230 port 53526 ssh2 Jan 14 09:23:23 host sshd[783]: Received disconnect from 190.188.217.230 port 53526:11: Bye Bye [preauth] Jan 14 09:23:23 host sshd[783]: Disconnected from 190.188.217.230 port 53526 [preauth] Jan 14 09:23:28 host sshd[797]: Invalid user wanweitao from 43.153.12.87 port 37404 Jan 14 09:23:28 host sshd[797]: input_userauth_request: invalid user wanweitao [preauth] Jan 14 09:23:28 host sshd[797]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:23:28 host sshd[797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.12.87 Jan 14 09:23:29 host sshd[797]: Failed password for invalid user wanweitao from 43.153.12.87 port 37404 ssh2 Jan 14 09:23:30 host sshd[797]: Received disconnect from 43.153.12.87 port 37404:11: Bye Bye [preauth] Jan 14 09:23:30 host sshd[797]: Disconnected from 43.153.12.87 port 37404 [preauth] Jan 14 09:23:53 host sshd[857]: Invalid user whmcs from 194.204.194.11 port 37362 Jan 14 09:23:53 host sshd[857]: input_userauth_request: invalid user whmcs [preauth] Jan 14 09:23:53 host sshd[857]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:23:53 host sshd[857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 Jan 14 09:23:56 host sshd[857]: Failed password for invalid user whmcs from 194.204.194.11 port 37362 ssh2 Jan 14 09:23:56 host sshd[857]: Received disconnect from 194.204.194.11 port 37362:11: Bye Bye [preauth] Jan 14 09:23:56 host sshd[857]: Disconnected from 194.204.194.11 port 37362 [preauth] Jan 14 09:24:05 host sshd[910]: User root from 154.221.26.62 not allowed because not listed in AllowUsers Jan 14 09:24:05 host sshd[910]: input_userauth_request: invalid user root [preauth] Jan 14 09:24:05 host unix_chkpwd[912]: password check failed for user (root) Jan 14 09:24:05 host sshd[910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.26.62 user=root Jan 14 09:24:05 host sshd[910]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:24:07 host sshd[910]: Failed password for invalid user root from 154.221.26.62 port 56312 ssh2 Jan 14 09:24:07 host sshd[910]: Received disconnect from 154.221.26.62 port 56312:11: Bye Bye [preauth] Jan 14 09:24:07 host sshd[910]: Disconnected from 154.221.26.62 port 56312 [preauth] Jan 14 09:24:21 host sshd[960]: User root from 157.230.36.91 not allowed because not listed in AllowUsers Jan 14 09:24:21 host sshd[960]: input_userauth_request: invalid user root [preauth] Jan 14 09:24:21 host unix_chkpwd[963]: password check failed for user (root) Jan 14 09:24:21 host sshd[960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.36.91 user=root Jan 14 09:24:21 host sshd[960]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:24:24 host sshd[960]: Failed password for invalid user root from 157.230.36.91 port 34936 ssh2 Jan 14 09:24:24 host sshd[960]: Received disconnect from 157.230.36.91 port 34936:11: Bye Bye [preauth] Jan 14 09:24:24 host sshd[960]: Disconnected from 157.230.36.91 port 34936 [preauth] Jan 14 09:24:40 host sshd[1038]: Invalid user guest from 95.85.34.53 port 47728 Jan 14 09:24:40 host sshd[1038]: input_userauth_request: invalid user guest [preauth] Jan 14 09:24:40 host sshd[1038]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:24:40 host sshd[1038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.34.53 Jan 14 09:24:42 host sshd[1041]: User root from 43.153.12.87 not allowed because not listed in AllowUsers Jan 14 09:24:42 host sshd[1041]: input_userauth_request: invalid user root [preauth] Jan 14 09:24:42 host unix_chkpwd[1045]: password check failed for user (root) Jan 14 09:24:42 host sshd[1041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.12.87 user=root Jan 14 09:24:42 host sshd[1041]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:24:42 host sshd[1038]: Failed password for invalid user guest from 95.85.34.53 port 47728 ssh2 Jan 14 09:24:43 host sshd[1038]: Received disconnect from 95.85.34.53 port 47728:11: Bye Bye [preauth] Jan 14 09:24:43 host sshd[1038]: Disconnected from 95.85.34.53 port 47728 [preauth] Jan 14 09:24:44 host sshd[1041]: Failed password for invalid user root from 43.153.12.87 port 36200 ssh2 Jan 14 09:24:48 host sshd[1082]: Invalid user wuzhikun from 179.27.60.34 port 56120 Jan 14 09:24:48 host sshd[1082]: input_userauth_request: invalid user wuzhikun [preauth] Jan 14 09:24:48 host sshd[1082]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:24:48 host sshd[1082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 Jan 14 09:24:50 host sshd[1082]: Failed password for invalid user wuzhikun from 179.27.60.34 port 56120 ssh2 Jan 14 09:24:51 host sshd[1082]: Received disconnect from 179.27.60.34 port 56120:11: Bye Bye [preauth] Jan 14 09:24:51 host sshd[1082]: Disconnected from 179.27.60.34 port 56120 [preauth] Jan 14 09:24:55 host sshd[1124]: User root from 190.188.217.230 not allowed because not listed in AllowUsers Jan 14 09:24:55 host sshd[1124]: input_userauth_request: invalid user root [preauth] Jan 14 09:24:55 host unix_chkpwd[1128]: password check failed for user (root) Jan 14 09:24:55 host sshd[1124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.188.217.230 user=root Jan 14 09:24:55 host sshd[1124]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:24:57 host sshd[1124]: Failed password for invalid user root from 190.188.217.230 port 38683 ssh2 Jan 14 09:24:57 host sshd[1124]: Received disconnect from 190.188.217.230 port 38683:11: Bye Bye [preauth] Jan 14 09:24:57 host sshd[1124]: Disconnected from 190.188.217.230 port 38683 [preauth] Jan 14 09:24:57 host sshd[1132]: Invalid user whmcs from 24.185.96.44 port 58112 Jan 14 09:24:57 host sshd[1132]: input_userauth_request: invalid user whmcs [preauth] Jan 14 09:24:57 host sshd[1132]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:24:57 host sshd[1132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.185.96.44 Jan 14 09:25:00 host sshd[1132]: Failed password for invalid user whmcs from 24.185.96.44 port 58112 ssh2 Jan 14 09:25:00 host sshd[1132]: Received disconnect from 24.185.96.44 port 58112:11: Bye Bye [preauth] Jan 14 09:25:00 host sshd[1132]: Disconnected from 24.185.96.44 port 58112 [preauth] Jan 14 09:25:13 host sshd[1196]: Invalid user liangshuang from 14.128.42.126 port 46790 Jan 14 09:25:13 host sshd[1196]: input_userauth_request: invalid user liangshuang [preauth] Jan 14 09:25:13 host sshd[1196]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:25:13 host sshd[1196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.128.42.126 Jan 14 09:25:15 host sshd[1196]: Failed password for invalid user liangshuang from 14.128.42.126 port 46790 ssh2 Jan 14 09:25:15 host sshd[1196]: Received disconnect from 14.128.42.126 port 46790:11: Bye Bye [preauth] Jan 14 09:25:15 host sshd[1196]: Disconnected from 14.128.42.126 port 46790 [preauth] Jan 14 09:26:03 host sshd[1389]: User root from 24.185.96.44 not allowed because not listed in AllowUsers Jan 14 09:26:03 host sshd[1389]: input_userauth_request: invalid user root [preauth] Jan 14 09:26:03 host unix_chkpwd[1402]: password check failed for user (root) Jan 14 09:26:03 host sshd[1389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.185.96.44 user=root Jan 14 09:26:03 host sshd[1389]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:26:04 host sshd[1389]: Failed password for invalid user root from 24.185.96.44 port 47076 ssh2 Jan 14 09:26:05 host sshd[1389]: Received disconnect from 24.185.96.44 port 47076:11: Bye Bye [preauth] Jan 14 09:26:05 host sshd[1389]: Disconnected from 24.185.96.44 port 47076 [preauth] Jan 14 09:26:37 host sshd[1495]: User root from 179.27.60.34 not allowed because not listed in AllowUsers Jan 14 09:26:37 host sshd[1495]: input_userauth_request: invalid user root [preauth] Jan 14 09:26:37 host unix_chkpwd[1498]: password check failed for user (root) Jan 14 09:26:37 host sshd[1495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Jan 14 09:26:37 host sshd[1495]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:26:38 host sshd[1495]: Failed password for invalid user root from 179.27.60.34 port 32107 ssh2 Jan 14 09:28:57 host sshd[1755]: Invalid user admin from 112.165.168.244 port 60636 Jan 14 09:28:57 host sshd[1755]: input_userauth_request: invalid user admin [preauth] Jan 14 09:28:57 host sshd[1755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:28:57 host sshd[1755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.165.168.244 Jan 14 09:29:00 host sshd[1755]: Failed password for invalid user admin from 112.165.168.244 port 60636 ssh2 Jan 14 09:29:01 host sshd[1755]: Failed password for invalid user admin from 112.165.168.244 port 60636 ssh2 Jan 14 09:29:03 host sshd[1755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:29:05 host sshd[1755]: Failed password for invalid user admin from 112.165.168.244 port 60636 ssh2 Jan 14 09:29:06 host sshd[1755]: Connection reset by 112.165.168.244 port 60636 [preauth] Jan 14 09:29:06 host sshd[1755]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.165.168.244 Jan 14 09:29:26 host sshd[1741]: Connection closed by 14.128.42.126 port 49562 [preauth] Jan 14 09:32:33 host sshd[2365]: User centos from 14.128.42.126 not allowed because not listed in AllowUsers Jan 14 09:32:33 host sshd[2365]: input_userauth_request: invalid user centos [preauth] Jan 14 09:32:33 host unix_chkpwd[2375]: password check failed for user (centos) Jan 14 09:32:33 host sshd[2365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.128.42.126 user=centos Jan 14 09:32:36 host sshd[2365]: Failed password for invalid user centos from 14.128.42.126 port 51200 ssh2 Jan 14 09:32:36 host sshd[2365]: Received disconnect from 14.128.42.126 port 51200:11: Bye Bye [preauth] Jan 14 09:32:36 host sshd[2365]: Disconnected from 14.128.42.126 port 51200 [preauth] Jan 14 09:35:32 host sshd[2869]: Did not receive identification string from 59.7.144.21 port 63756 Jan 14 09:38:09 host sshd[3245]: Connection reset by 203.205.30.41 port 51212 [preauth] Jan 14 09:40:20 host sshd[3653]: Invalid user wunian from 104.131.66.177 port 51002 Jan 14 09:40:20 host sshd[3653]: input_userauth_request: invalid user wunian [preauth] Jan 14 09:40:20 host sshd[3653]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:40:20 host sshd[3653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.66.177 Jan 14 09:40:22 host sshd[3653]: Failed password for invalid user wunian from 104.131.66.177 port 51002 ssh2 Jan 14 09:40:22 host sshd[3653]: Received disconnect from 104.131.66.177 port 51002:11: Bye Bye [preauth] Jan 14 09:40:22 host sshd[3653]: Disconnected from 104.131.66.177 port 51002 [preauth] Jan 14 09:40:31 host sshd[3705]: Invalid user devadmin from 52.172.30.44 port 51964 Jan 14 09:40:31 host sshd[3705]: input_userauth_request: invalid user devadmin [preauth] Jan 14 09:40:31 host sshd[3705]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:40:31 host sshd[3705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.30.44 Jan 14 09:40:33 host sshd[3705]: Failed password for invalid user devadmin from 52.172.30.44 port 51964 ssh2 Jan 14 09:40:33 host sshd[3705]: Received disconnect from 52.172.30.44 port 51964:11: Bye Bye [preauth] Jan 14 09:40:33 host sshd[3705]: Disconnected from 52.172.30.44 port 51964 [preauth] Jan 14 09:40:49 host sshd[3733]: Invalid user internet from 43.153.24.87 port 46432 Jan 14 09:40:49 host sshd[3733]: input_userauth_request: invalid user internet [preauth] Jan 14 09:40:49 host sshd[3733]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:40:49 host sshd[3733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.24.87 Jan 14 09:40:50 host sshd[3733]: Failed password for invalid user internet from 43.153.24.87 port 46432 ssh2 Jan 14 09:40:50 host sshd[3733]: Received disconnect from 43.153.24.87 port 46432:11: Bye Bye [preauth] Jan 14 09:40:50 host sshd[3733]: Disconnected from 43.153.24.87 port 46432 [preauth] Jan 14 09:41:25 host sshd[3793]: User mysql from 43.153.178.30 not allowed because not listed in AllowUsers Jan 14 09:41:25 host sshd[3793]: input_userauth_request: invalid user mysql [preauth] Jan 14 09:41:25 host unix_chkpwd[3796]: password check failed for user (mysql) Jan 14 09:41:25 host sshd[3793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.178.30 user=mysql Jan 14 09:41:25 host sshd[3793]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 14 09:41:27 host sshd[3793]: Failed password for invalid user mysql from 43.153.178.30 port 59834 ssh2 Jan 14 09:41:27 host sshd[3793]: Received disconnect from 43.153.178.30 port 59834:11: Bye Bye [preauth] Jan 14 09:41:27 host sshd[3793]: Disconnected from 43.153.178.30 port 59834 [preauth] Jan 14 09:41:31 host sshd[3825]: Invalid user bikun from 68.183.191.56 port 50444 Jan 14 09:41:31 host sshd[3825]: input_userauth_request: invalid user bikun [preauth] Jan 14 09:41:31 host sshd[3825]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:41:31 host sshd[3825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.191.56 Jan 14 09:41:33 host sshd[3825]: Failed password for invalid user bikun from 68.183.191.56 port 50444 ssh2 Jan 14 09:41:33 host sshd[3825]: Received disconnect from 68.183.191.56 port 50444:11: Bye Bye [preauth] Jan 14 09:41:33 host sshd[3825]: Disconnected from 68.183.191.56 port 50444 [preauth] Jan 14 09:42:13 host sshd[3891]: Invalid user dqi from 200.16.132.42 port 54210 Jan 14 09:42:13 host sshd[3891]: input_userauth_request: invalid user dqi [preauth] Jan 14 09:42:13 host sshd[3891]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:42:13 host sshd[3891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.42 Jan 14 09:42:15 host sshd[3891]: Failed password for invalid user dqi from 200.16.132.42 port 54210 ssh2 Jan 14 09:42:15 host sshd[3891]: Received disconnect from 200.16.132.42 port 54210:11: Bye Bye [preauth] Jan 14 09:42:15 host sshd[3891]: Disconnected from 200.16.132.42 port 54210 [preauth] Jan 14 09:42:25 host sshd[3912]: User root from 1.174.71.134 not allowed because not listed in AllowUsers Jan 14 09:42:25 host sshd[3912]: input_userauth_request: invalid user root [preauth] Jan 14 09:42:25 host unix_chkpwd[3915]: password check failed for user (root) Jan 14 09:42:25 host sshd[3912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.174.71.134 user=root Jan 14 09:42:25 host sshd[3912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:42:27 host sshd[3912]: Failed password for invalid user root from 1.174.71.134 port 33558 ssh2 Jan 14 09:42:28 host unix_chkpwd[3940]: password check failed for user (root) Jan 14 09:42:28 host sshd[3912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:42:30 host sshd[3912]: Failed password for invalid user root from 1.174.71.134 port 33558 ssh2 Jan 14 09:42:30 host unix_chkpwd[3943]: password check failed for user (root) Jan 14 09:42:30 host sshd[3912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:42:32 host sshd[3912]: Failed password for invalid user root from 1.174.71.134 port 33558 ssh2 Jan 14 09:42:33 host unix_chkpwd[3951]: password check failed for user (root) Jan 14 09:42:33 host sshd[3912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:42:35 host sshd[3912]: Failed password for invalid user root from 1.174.71.134 port 33558 ssh2 Jan 14 09:43:13 host sshd[4035]: Invalid user test1 from 177.36.14.101 port 39048 Jan 14 09:43:13 host sshd[4035]: input_userauth_request: invalid user test1 [preauth] Jan 14 09:43:13 host sshd[4035]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:43:13 host sshd[4035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.36.14.101 Jan 14 09:43:14 host sshd[4035]: Failed password for invalid user test1 from 177.36.14.101 port 39048 ssh2 Jan 14 09:43:15 host sshd[4035]: Received disconnect from 177.36.14.101 port 39048:11: Bye Bye [preauth] Jan 14 09:43:15 host sshd[4035]: Disconnected from 177.36.14.101 port 39048 [preauth] Jan 14 09:43:59 host sshd[4126]: Invalid user git from 104.131.66.177 port 36290 Jan 14 09:43:59 host sshd[4126]: input_userauth_request: invalid user git [preauth] Jan 14 09:43:59 host sshd[4126]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:43:59 host sshd[4126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.66.177 Jan 14 09:44:00 host sshd[4126]: Failed password for invalid user git from 104.131.66.177 port 36290 ssh2 Jan 14 09:44:00 host sshd[4126]: Received disconnect from 104.131.66.177 port 36290:11: Bye Bye [preauth] Jan 14 09:44:00 host sshd[4126]: Disconnected from 104.131.66.177 port 36290 [preauth] Jan 14 09:44:13 host sshd[4156]: Invalid user jwdou from 43.153.24.87 port 60626 Jan 14 09:44:13 host sshd[4156]: input_userauth_request: invalid user jwdou [preauth] Jan 14 09:44:13 host sshd[4156]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:44:13 host sshd[4156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.24.87 Jan 14 09:44:15 host sshd[4156]: Failed password for invalid user jwdou from 43.153.24.87 port 60626 ssh2 Jan 14 09:44:15 host sshd[4156]: Received disconnect from 43.153.24.87 port 60626:11: Bye Bye [preauth] Jan 14 09:44:15 host sshd[4156]: Disconnected from 43.153.24.87 port 60626 [preauth] Jan 14 09:44:33 host sshd[4207]: Invalid user legal from 68.183.191.56 port 53532 Jan 14 09:44:33 host sshd[4207]: input_userauth_request: invalid user legal [preauth] Jan 14 09:44:33 host sshd[4207]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:44:33 host sshd[4207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.191.56 Jan 14 09:44:35 host sshd[4207]: Failed password for invalid user legal from 68.183.191.56 port 53532 ssh2 Jan 14 09:44:35 host sshd[4207]: Received disconnect from 68.183.191.56 port 53532:11: Bye Bye [preauth] Jan 14 09:44:35 host sshd[4207]: Disconnected from 68.183.191.56 port 53532 [preauth] Jan 14 09:44:51 host sshd[4232]: User root from 177.36.14.101 not allowed because not listed in AllowUsers Jan 14 09:44:51 host sshd[4232]: input_userauth_request: invalid user root [preauth] Jan 14 09:44:51 host unix_chkpwd[4235]: password check failed for user (root) Jan 14 09:44:51 host sshd[4232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.36.14.101 user=root Jan 14 09:44:51 host sshd[4232]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:44:54 host sshd[4232]: Failed password for invalid user root from 177.36.14.101 port 52932 ssh2 Jan 14 09:44:54 host sshd[4232]: Received disconnect from 177.36.14.101 port 52932:11: Bye Bye [preauth] Jan 14 09:44:54 host sshd[4232]: Disconnected from 177.36.14.101 port 52932 [preauth] Jan 14 09:44:56 host sshd[4240]: Invalid user sys-admin from 210.17.230.213 port 64350 Jan 14 09:44:56 host sshd[4240]: input_userauth_request: invalid user sys-admin [preauth] Jan 14 09:44:56 host sshd[4240]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:44:56 host sshd[4240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.17.230.213 Jan 14 09:44:57 host sshd[4240]: Failed password for invalid user sys-admin from 210.17.230.213 port 64350 ssh2 Jan 14 09:44:58 host sshd[4240]: Received disconnect from 210.17.230.213 port 64350:11: Bye Bye [preauth] Jan 14 09:44:58 host sshd[4240]: Disconnected from 210.17.230.213 port 64350 [preauth] Jan 14 09:45:03 host sshd[4338]: Invalid user info from 104.131.66.177 port 57166 Jan 14 09:45:03 host sshd[4338]: input_userauth_request: invalid user info [preauth] Jan 14 09:45:03 host sshd[4338]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:45:03 host sshd[4338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.66.177 Jan 14 09:45:03 host sshd[4358]: Invalid user Satoshi from 200.16.132.42 port 43831 Jan 14 09:45:03 host sshd[4358]: input_userauth_request: invalid user Satoshi [preauth] Jan 14 09:45:03 host sshd[4358]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:45:03 host sshd[4358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.42 Jan 14 09:45:05 host sshd[4338]: Failed password for invalid user info from 104.131.66.177 port 57166 ssh2 Jan 14 09:45:06 host sshd[4358]: Failed password for invalid user Satoshi from 200.16.132.42 port 43831 ssh2 Jan 14 09:45:07 host sshd[4358]: Received disconnect from 200.16.132.42 port 43831:11: Bye Bye [preauth] Jan 14 09:45:07 host sshd[4358]: Disconnected from 200.16.132.42 port 43831 [preauth] Jan 14 09:45:21 host sshd[4459]: Invalid user moadmin from 43.153.24.87 port 59296 Jan 14 09:45:21 host sshd[4459]: input_userauth_request: invalid user moadmin [preauth] Jan 14 09:45:21 host sshd[4459]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:45:21 host sshd[4459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.24.87 Jan 14 09:45:23 host sshd[4459]: Failed password for invalid user moadmin from 43.153.24.87 port 59296 ssh2 Jan 14 09:45:23 host sshd[4459]: Received disconnect from 43.153.24.87 port 59296:11: Bye Bye [preauth] Jan 14 09:45:23 host sshd[4459]: Disconnected from 43.153.24.87 port 59296 [preauth] Jan 14 09:45:56 host sshd[4569]: Invalid user walson from 68.183.191.56 port 39426 Jan 14 09:45:56 host sshd[4569]: input_userauth_request: invalid user walson [preauth] Jan 14 09:45:56 host sshd[4569]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:45:56 host sshd[4569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.191.56 Jan 14 09:45:58 host sshd[4573]: User root from 43.153.178.30 not allowed because not listed in AllowUsers Jan 14 09:45:58 host sshd[4573]: input_userauth_request: invalid user root [preauth] Jan 14 09:45:58 host unix_chkpwd[4577]: password check failed for user (root) Jan 14 09:45:58 host sshd[4573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.178.30 user=root Jan 14 09:45:58 host sshd[4573]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:45:58 host sshd[4569]: Failed password for invalid user walson from 68.183.191.56 port 39426 ssh2 Jan 14 09:45:58 host sshd[4569]: Received disconnect from 68.183.191.56 port 39426:11: Bye Bye [preauth] Jan 14 09:45:58 host sshd[4569]: Disconnected from 68.183.191.56 port 39426 [preauth] Jan 14 09:46:00 host sshd[4573]: Failed password for invalid user root from 43.153.178.30 port 45498 ssh2 Jan 14 09:46:00 host sshd[4573]: Received disconnect from 43.153.178.30 port 45498:11: Bye Bye [preauth] Jan 14 09:46:00 host sshd[4573]: Disconnected from 43.153.178.30 port 45498 [preauth] Jan 14 09:46:05 host sshd[4660]: User root from 52.172.30.44 not allowed because not listed in AllowUsers Jan 14 09:46:05 host sshd[4660]: input_userauth_request: invalid user root [preauth] Jan 14 09:46:05 host unix_chkpwd[4662]: password check failed for user (root) Jan 14 09:46:05 host sshd[4660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.30.44 user=root Jan 14 09:46:05 host sshd[4660]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 09:46:07 host sshd[4660]: Failed password for invalid user root from 52.172.30.44 port 46294 ssh2 Jan 14 09:46:07 host sshd[4660]: Received disconnect from 52.172.30.44 port 46294:11: Bye Bye [preauth] Jan 14 09:46:07 host sshd[4660]: Disconnected from 52.172.30.44 port 46294 [preauth] Jan 14 09:46:34 host sshd[4759]: Invalid user db from 200.16.132.42 port 57414 Jan 14 09:46:34 host sshd[4759]: input_userauth_request: invalid user db [preauth] Jan 14 09:46:34 host sshd[4759]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:46:34 host sshd[4759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.42 Jan 14 09:46:36 host sshd[4764]: Invalid user git from 210.17.230.213 port 52999 Jan 14 09:46:36 host sshd[4764]: input_userauth_request: invalid user git [preauth] Jan 14 09:46:36 host sshd[4764]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:46:36 host sshd[4764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.17.230.213 Jan 14 09:46:37 host sshd[4759]: Failed password for invalid user db from 200.16.132.42 port 57414 ssh2 Jan 14 09:46:37 host sshd[4759]: Received disconnect from 200.16.132.42 port 57414:11: Bye Bye [preauth] Jan 14 09:46:37 host sshd[4759]: Disconnected from 200.16.132.42 port 57414 [preauth] Jan 14 09:46:37 host sshd[4764]: Failed password for invalid user git from 210.17.230.213 port 52999 ssh2 Jan 14 09:46:37 host sshd[4764]: Received disconnect from 210.17.230.213 port 52999:11: Bye Bye [preauth] Jan 14 09:46:37 host sshd[4764]: Disconnected from 210.17.230.213 port 52999 [preauth] Jan 14 09:48:00 host sshd[4932]: Invalid user wunian from 210.17.230.213 port 21268 Jan 14 09:48:00 host sshd[4932]: input_userauth_request: invalid user wunian [preauth] Jan 14 09:48:00 host sshd[4932]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:48:00 host sshd[4932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.17.230.213 Jan 14 09:48:01 host sshd[4932]: Failed password for invalid user wunian from 210.17.230.213 port 21268 ssh2 Jan 14 09:48:01 host sshd[4932]: Received disconnect from 210.17.230.213 port 21268:11: Bye Bye [preauth] Jan 14 09:48:01 host sshd[4932]: Disconnected from 210.17.230.213 port 21268 [preauth] Jan 14 09:49:30 host sshd[5128]: Invalid user steam from 116.15.140.30 port 63193 Jan 14 09:49:30 host sshd[5128]: input_userauth_request: invalid user steam [preauth] Jan 14 09:49:30 host sshd[5128]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:49:30 host sshd[5128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.15.140.30 Jan 14 09:49:32 host sshd[5128]: Failed password for invalid user steam from 116.15.140.30 port 63193 ssh2 Jan 14 09:49:32 host sshd[5128]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:49:34 host sshd[5128]: Failed password for invalid user steam from 116.15.140.30 port 63193 ssh2 Jan 14 09:49:35 host sshd[5128]: Failed password for invalid user steam from 116.15.140.30 port 63193 ssh2 Jan 14 09:49:35 host sshd[5128]: Connection closed by 116.15.140.30 port 63193 [preauth] Jan 14 09:49:35 host sshd[5128]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.15.140.30 Jan 14 09:50:51 host sshd[5409]: Connection reset by 114.33.108.219 port 47414 [preauth] Jan 14 09:50:58 host sshd[5415]: Invalid user sFTPUser from 84.0.90.48 port 56458 Jan 14 09:50:58 host sshd[5415]: input_userauth_request: invalid user sFTPUser [preauth] Jan 14 09:50:58 host sshd[5415]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:50:58 host sshd[5415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.0.90.48 Jan 14 09:51:00 host sshd[5415]: Failed password for invalid user sFTPUser from 84.0.90.48 port 56458 ssh2 Jan 14 09:51:01 host sshd[5415]: pam_unix(sshd:auth): check pass; user unknown Jan 14 09:51:03 host sshd[5415]: Failed password for invalid user sFTPUser from 84.0.90.48 port 56458 ssh2 Jan 14 09:51:04 host sshd[5415]: Connection reset by 84.0.90.48 port 56458 [preauth] Jan 14 09:51:04 host sshd[5415]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.0.90.48 Jan 14 09:55:19 host sshd[5875]: ssh_dispatch_run_fatal: Connection from 207.229.167.36 port 47388: Connection corrupted [preauth] Jan 14 10:03:20 host sshd[7020]: User root from 211.225.82.121 not allowed because not listed in AllowUsers Jan 14 10:03:20 host sshd[7020]: input_userauth_request: invalid user root [preauth] Jan 14 10:03:20 host unix_chkpwd[7025]: password check failed for user (root) Jan 14 10:03:20 host sshd[7020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.225.82.121 user=root Jan 14 10:03:20 host sshd[7020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 10:03:21 host sshd[7020]: Failed password for invalid user root from 211.225.82.121 port 63055 ssh2 Jan 14 10:03:22 host unix_chkpwd[7031]: password check failed for user (root) Jan 14 10:03:22 host sshd[7020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 10:03:25 host sshd[7020]: Failed password for invalid user root from 211.225.82.121 port 63055 ssh2 Jan 14 10:03:25 host unix_chkpwd[7040]: password check failed for user (root) Jan 14 10:03:25 host sshd[7020]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 10:03:27 host sshd[7020]: Failed password for invalid user root from 211.225.82.121 port 63055 ssh2 Jan 14 10:03:28 host sshd[7020]: Connection reset by 211.225.82.121 port 63055 [preauth] Jan 14 10:03:28 host sshd[7020]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.225.82.121 user=root Jan 14 10:07:44 host sshd[7844]: Invalid user dw from 194.110.203.109 port 34950 Jan 14 10:07:44 host sshd[7844]: input_userauth_request: invalid user dw [preauth] Jan 14 10:07:44 host sshd[7844]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:07:44 host sshd[7844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 10:07:46 host sshd[7844]: Failed password for invalid user dw from 194.110.203.109 port 34950 ssh2 Jan 14 10:07:49 host sshd[7844]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:07:51 host sshd[7844]: Failed password for invalid user dw from 194.110.203.109 port 34950 ssh2 Jan 14 10:07:55 host sshd[7844]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:07:57 host sshd[7844]: Failed password for invalid user dw from 194.110.203.109 port 34950 ssh2 Jan 14 10:08:00 host sshd[7844]: Connection closed by 194.110.203.109 port 34950 [preauth] Jan 14 10:08:00 host sshd[7844]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 10:08:45 host sshd[7959]: User root from 79.156.3.124 not allowed because not listed in AllowUsers Jan 14 10:08:45 host sshd[7959]: input_userauth_request: invalid user root [preauth] Jan 14 10:08:45 host unix_chkpwd[7962]: password check failed for user (root) Jan 14 10:08:45 host sshd[7959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.156.3.124 user=root Jan 14 10:08:45 host sshd[7959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 10:08:48 host sshd[7959]: Failed password for invalid user root from 79.156.3.124 port 35978 ssh2 Jan 14 10:08:49 host unix_chkpwd[7967]: password check failed for user (root) Jan 14 10:08:49 host sshd[7959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 10:08:51 host sshd[7959]: Failed password for invalid user root from 79.156.3.124 port 35978 ssh2 Jan 14 10:08:52 host unix_chkpwd[7972]: password check failed for user (root) Jan 14 10:08:52 host sshd[7959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 10:08:54 host sshd[7959]: Failed password for invalid user root from 79.156.3.124 port 35978 ssh2 Jan 14 10:08:59 host unix_chkpwd[7979]: password check failed for user (root) Jan 14 10:08:59 host sshd[7959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 10:09:00 host sshd[7959]: Failed password for invalid user root from 79.156.3.124 port 35978 ssh2 Jan 14 10:14:54 host sshd[8874]: Invalid user admin from 60.51.108.131 port 43596 Jan 14 10:14:54 host sshd[8874]: input_userauth_request: invalid user admin [preauth] Jan 14 10:14:54 host sshd[8874]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:14:54 host sshd[8874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.51.108.131 Jan 14 10:14:56 host sshd[8874]: Failed password for invalid user admin from 60.51.108.131 port 43596 ssh2 Jan 14 10:14:56 host sshd[8874]: Failed password for invalid user admin from 60.51.108.131 port 43596 ssh2 Jan 14 10:14:57 host sshd[8874]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:14:59 host sshd[8874]: Failed password for invalid user admin from 60.51.108.131 port 43596 ssh2 Jan 14 10:14:59 host sshd[8874]: Connection reset by 60.51.108.131 port 43596 [preauth] Jan 14 10:14:59 host sshd[8874]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.51.108.131 Jan 14 10:18:39 host sshd[9307]: Invalid user libstoragemgmt from 205.185.113.129 port 40828 Jan 14 10:18:39 host sshd[9307]: input_userauth_request: invalid user libstoragemgmt [preauth] Jan 14 10:18:39 host sshd[9307]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:18:39 host sshd[9307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 14 10:18:41 host sshd[9307]: Failed password for invalid user libstoragemgmt from 205.185.113.129 port 40828 ssh2 Jan 14 10:18:42 host sshd[9307]: Connection closed by 205.185.113.129 port 40828 [preauth] Jan 14 10:21:08 host sshd[9721]: Invalid user ubnt from 195.226.194.242 port 47188 Jan 14 10:21:08 host sshd[9721]: input_userauth_request: invalid user ubnt [preauth] Jan 14 10:21:08 host sshd[9721]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:21:08 host sshd[9721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 14 10:21:10 host sshd[9721]: Failed password for invalid user ubnt from 195.226.194.242 port 47188 ssh2 Jan 14 10:21:10 host sshd[9721]: Received disconnect from 195.226.194.242 port 47188:11: Bye Bye [preauth] Jan 14 10:21:10 host sshd[9721]: Disconnected from 195.226.194.242 port 47188 [preauth] Jan 14 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwtestugo user-2=shalinijames user-3=vfmassets user-4=pmcresources user-5=disposeat user-6=remysagr user-7=wwwkmaorg user-8=woodpeck user-9=wwwkapin user-10=phmetals user-11=kottayamcalldriv user-12=gifterman user-13=palco123 user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=ugotscom user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 10:22:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Y2uiykp9Hmr6FWzJ.~ Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Y2uiykp9Hmr6FWzJ.~' Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Y2uiykp9Hmr6FWzJ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 10:22:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 10:22:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 10:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 10:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 10:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 10:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:22:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 10:22:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 10:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 10:27:19 host sshd[10691]: Invalid user sys-admin from 200.69.196.27 port 59285 Jan 14 10:27:19 host sshd[10691]: input_userauth_request: invalid user sys-admin [preauth] Jan 14 10:27:19 host sshd[10691]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:27:19 host sshd[10691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.196.27 Jan 14 10:27:21 host sshd[10691]: Failed password for invalid user sys-admin from 200.69.196.27 port 59285 ssh2 Jan 14 10:27:22 host sshd[10691]: Received disconnect from 200.69.196.27 port 59285:11: Bye Bye [preauth] Jan 14 10:27:22 host sshd[10691]: Disconnected from 200.69.196.27 port 59285 [preauth] Jan 14 10:29:15 host sshd[10917]: Invalid user devadmin from 190.104.220.42 port 44636 Jan 14 10:29:15 host sshd[10917]: input_userauth_request: invalid user devadmin [preauth] Jan 14 10:29:15 host sshd[10917]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:29:15 host sshd[10917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.220.42 Jan 14 10:29:17 host sshd[10917]: Failed password for invalid user devadmin from 190.104.220.42 port 44636 ssh2 Jan 14 10:29:18 host sshd[10917]: Received disconnect from 190.104.220.42 port 44636:11: Bye Bye [preauth] Jan 14 10:29:18 host sshd[10917]: Disconnected from 190.104.220.42 port 44636 [preauth] Jan 14 10:33:01 host sshd[11446]: Invalid user brody from 200.69.196.27 port 43568 Jan 14 10:33:01 host sshd[11446]: input_userauth_request: invalid user brody [preauth] Jan 14 10:33:01 host sshd[11446]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:33:01 host sshd[11446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.196.27 Jan 14 10:33:03 host sshd[11446]: Failed password for invalid user brody from 200.69.196.27 port 43568 ssh2 Jan 14 10:33:03 host sshd[11446]: Received disconnect from 200.69.196.27 port 43568:11: Bye Bye [preauth] Jan 14 10:33:03 host sshd[11446]: Disconnected from 200.69.196.27 port 43568 [preauth] Jan 14 10:34:18 host sshd[11618]: Invalid user admin from 211.46.176.215 port 60691 Jan 14 10:34:18 host sshd[11618]: input_userauth_request: invalid user admin [preauth] Jan 14 10:34:18 host sshd[11618]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:34:18 host sshd[11618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.46.176.215 Jan 14 10:34:20 host sshd[11618]: Failed password for invalid user admin from 211.46.176.215 port 60691 ssh2 Jan 14 10:34:20 host sshd[11618]: Failed password for invalid user admin from 211.46.176.215 port 60691 ssh2 Jan 14 10:34:21 host sshd[11618]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:34:23 host sshd[11618]: Failed password for invalid user admin from 211.46.176.215 port 60691 ssh2 Jan 14 10:34:23 host sshd[11618]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:34:26 host sshd[11618]: Failed password for invalid user admin from 211.46.176.215 port 60691 ssh2 Jan 14 10:34:26 host sshd[11618]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:34:29 host sshd[11618]: Failed password for invalid user admin from 211.46.176.215 port 60691 ssh2 Jan 14 10:34:29 host sshd[11618]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:34:32 host sshd[11618]: Failed password for invalid user admin from 211.46.176.215 port 60691 ssh2 Jan 14 10:34:32 host sshd[11618]: error: maximum authentication attempts exceeded for invalid user admin from 211.46.176.215 port 60691 ssh2 [preauth] Jan 14 10:34:32 host sshd[11618]: Disconnecting: Too many authentication failures [preauth] Jan 14 10:34:32 host sshd[11618]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.46.176.215 Jan 14 10:34:32 host sshd[11618]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 14 10:37:07 host sshd[12096]: User root from 220.215.21.165 not allowed because not listed in AllowUsers Jan 14 10:37:07 host sshd[12096]: input_userauth_request: invalid user root [preauth] Jan 14 10:37:07 host unix_chkpwd[12102]: password check failed for user (root) Jan 14 10:37:07 host sshd[12096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.215.21.165 user=root Jan 14 10:37:07 host sshd[12096]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 10:37:08 host sshd[12096]: Failed password for invalid user root from 220.215.21.165 port 63194 ssh2 Jan 14 10:37:09 host sshd[12096]: Connection reset by 220.215.21.165 port 63194 [preauth] Jan 14 10:38:12 host sshd[12212]: Invalid user Admin from 114.33.124.56 port 34814 Jan 14 10:38:12 host sshd[12212]: input_userauth_request: invalid user Admin [preauth] Jan 14 10:38:12 host sshd[12212]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:38:12 host sshd[12212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.124.56 Jan 14 10:38:14 host sshd[12212]: Failed password for invalid user Admin from 114.33.124.56 port 34814 ssh2 Jan 14 10:38:16 host sshd[12212]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:38:18 host sshd[12212]: Failed password for invalid user Admin from 114.33.124.56 port 34814 ssh2 Jan 14 10:38:19 host sshd[12212]: Connection reset by 114.33.124.56 port 34814 [preauth] Jan 14 10:38:19 host sshd[12212]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.124.56 Jan 14 10:41:53 host sshd[12746]: Invalid user Admin from 59.23.58.176 port 61151 Jan 14 10:41:53 host sshd[12746]: input_userauth_request: invalid user Admin [preauth] Jan 14 10:41:53 host sshd[12746]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:41:53 host sshd[12746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.23.58.176 Jan 14 10:41:55 host sshd[12746]: Failed password for invalid user Admin from 59.23.58.176 port 61151 ssh2 Jan 14 10:41:55 host sshd[12746]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:41:57 host sshd[12746]: Failed password for invalid user Admin from 59.23.58.176 port 61151 ssh2 Jan 14 10:41:57 host sshd[12746]: pam_unix(sshd:auth): check pass; user unknown Jan 14 10:41:59 host sshd[12746]: Failed password for invalid user Admin from 59.23.58.176 port 61151 ssh2 Jan 14 10:49:28 host sshd[13717]: User ftp from 222.114.51.214 not allowed because not listed in AllowUsers Jan 14 10:49:28 host sshd[13717]: input_userauth_request: invalid user ftp [preauth] Jan 14 10:49:28 host unix_chkpwd[13741]: password check failed for user (ftp) Jan 14 10:49:28 host sshd[13717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.114.51.214 user=ftp Jan 14 10:49:28 host sshd[13717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 14 10:49:29 host sshd[13717]: Failed password for invalid user ftp from 222.114.51.214 port 49206 ssh2 Jan 14 10:49:30 host unix_chkpwd[13747]: password check failed for user (ftp) Jan 14 10:49:30 host sshd[13717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 14 10:49:32 host sshd[13717]: Failed password for invalid user ftp from 222.114.51.214 port 49206 ssh2 Jan 14 10:49:32 host unix_chkpwd[13749]: password check failed for user (ftp) Jan 14 10:49:32 host sshd[13717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 14 10:49:34 host sshd[13717]: Failed password for invalid user ftp from 222.114.51.214 port 49206 ssh2 Jan 14 10:49:35 host sshd[13717]: Failed password for invalid user ftp from 222.114.51.214 port 49206 ssh2 Jan 14 10:49:35 host unix_chkpwd[13760]: password check failed for user (ftp) Jan 14 10:49:35 host sshd[13717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 14 10:49:37 host sshd[13717]: Failed password for invalid user ftp from 222.114.51.214 port 49206 ssh2 Jan 14 10:52:08 host sshd[14134]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 14 10:52:08 host sshd[14134]: input_userauth_request: invalid user root [preauth] Jan 14 10:52:08 host unix_chkpwd[14137]: password check failed for user (root) Jan 14 10:52:08 host sshd[14134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 14 10:52:08 host sshd[14134]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 10:52:11 host sshd[14134]: Failed password for invalid user root from 195.226.194.242 port 27750 ssh2 Jan 14 10:52:11 host sshd[14134]: Received disconnect from 195.226.194.242 port 27750:11: Bye Bye [preauth] Jan 14 10:52:11 host sshd[14134]: Disconnected from 195.226.194.242 port 27750 [preauth] Jan 14 11:00:26 host sshd[15327]: User root from 76.136.255.204 not allowed because not listed in AllowUsers Jan 14 11:00:26 host sshd[15327]: input_userauth_request: invalid user root [preauth] Jan 14 11:00:26 host unix_chkpwd[15347]: password check failed for user (root) Jan 14 11:00:26 host sshd[15327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.136.255.204 user=root Jan 14 11:00:26 host sshd[15327]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 11:00:28 host sshd[15327]: Failed password for invalid user root from 76.136.255.204 port 42794 ssh2 Jan 14 11:09:10 host sshd[16465]: Invalid user oracle from 1.176.90.126 port 54420 Jan 14 11:09:10 host sshd[16465]: input_userauth_request: invalid user oracle [preauth] Jan 14 11:09:10 host sshd[16465]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:09:10 host sshd[16465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.176.90.126 Jan 14 11:09:12 host sshd[16465]: Failed password for invalid user oracle from 1.176.90.126 port 54420 ssh2 Jan 14 11:09:12 host sshd[16465]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:09:14 host sshd[16465]: Failed password for invalid user oracle from 1.176.90.126 port 54420 ssh2 Jan 14 11:09:14 host sshd[16465]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:09:16 host sshd[16465]: Failed password for invalid user oracle from 1.176.90.126 port 54420 ssh2 Jan 14 11:09:18 host sshd[16465]: Failed password for invalid user oracle from 1.176.90.126 port 54420 ssh2 Jan 14 11:09:20 host sshd[16465]: Connection reset by 1.176.90.126 port 54420 [preauth] Jan 14 11:09:20 host sshd[16465]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.176.90.126 Jan 14 11:09:29 host sshd[16477]: User root from 79.79.54.223 not allowed because not listed in AllowUsers Jan 14 11:09:29 host sshd[16477]: input_userauth_request: invalid user root [preauth] Jan 14 11:09:29 host unix_chkpwd[16651]: password check failed for user (root) Jan 14 11:09:29 host sshd[16477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.79.54.223 user=root Jan 14 11:09:29 host sshd[16477]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 11:09:32 host sshd[16477]: Failed password for invalid user root from 79.79.54.223 port 43471 ssh2 Jan 14 11:09:32 host unix_chkpwd[16658]: password check failed for user (root) Jan 14 11:09:32 host sshd[16477]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 11:09:34 host sshd[16477]: Failed password for invalid user root from 79.79.54.223 port 43471 ssh2 Jan 14 11:09:35 host unix_chkpwd[16663]: password check failed for user (root) Jan 14 11:09:35 host sshd[16477]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 11:09:37 host sshd[16477]: Failed password for invalid user root from 79.79.54.223 port 43471 ssh2 Jan 14 11:11:56 host sshd[16970]: Did not receive identification string from 223.245.0.5 port 48906 Jan 14 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 11:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=disposeat user-17=remysagr user-18=wwwkmaorg user-19=woodpeck user-20=wwwkapin user-21=palco123 user-22=gifterman user-23=phmetals user-24=kottayamcalldriv user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 11:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mul6yFs39GW24pAs.~ Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mul6yFs39GW24pAs.~' Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mul6yFs39GW24pAs.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 11:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 11:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 11:22:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 11:22:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 11:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 11:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 11:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 11:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 11:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 11:22:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 11:24:02 host sshd[19167]: Connection reset by 122.117.98.206 port 41346 [preauth] Jan 14 11:40:01 host sshd[21374]: Invalid user usr from 59.126.249.176 port 47897 Jan 14 11:40:01 host sshd[21374]: input_userauth_request: invalid user usr [preauth] Jan 14 11:40:01 host sshd[21374]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:40:01 host sshd[21374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.249.176 Jan 14 11:40:02 host sshd[21374]: Failed password for invalid user usr from 59.126.249.176 port 47897 ssh2 Jan 14 11:40:03 host sshd[21374]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:40:05 host sshd[21374]: Failed password for invalid user usr from 59.126.249.176 port 47897 ssh2 Jan 14 11:40:05 host sshd[21374]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:40:07 host sshd[21374]: Failed password for invalid user usr from 59.126.249.176 port 47897 ssh2 Jan 14 11:40:08 host sshd[21374]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:40:10 host sshd[21374]: Failed password for invalid user usr from 59.126.249.176 port 47897 ssh2 Jan 14 11:40:10 host sshd[21374]: Connection reset by 59.126.249.176 port 47897 [preauth] Jan 14 11:40:10 host sshd[21374]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.249.176 Jan 14 11:40:10 host sshd[21374]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 14 11:43:12 host sshd[21976]: Invalid user sFTPUser from 211.196.88.223 port 59161 Jan 14 11:43:12 host sshd[21976]: input_userauth_request: invalid user sFTPUser [preauth] Jan 14 11:43:12 host sshd[21976]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:43:12 host sshd[21976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.196.88.223 Jan 14 11:43:14 host sshd[21976]: Failed password for invalid user sFTPUser from 211.196.88.223 port 59161 ssh2 Jan 14 11:43:15 host sshd[21976]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:43:18 host sshd[21976]: Failed password for invalid user sFTPUser from 211.196.88.223 port 59161 ssh2 Jan 14 11:43:18 host sshd[21976]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:43:20 host sshd[21976]: Failed password for invalid user sFTPUser from 211.196.88.223 port 59161 ssh2 Jan 14 11:43:21 host sshd[21976]: Failed password for invalid user sFTPUser from 211.196.88.223 port 59161 ssh2 Jan 14 11:43:22 host sshd[21976]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:43:24 host sshd[21976]: Failed password for invalid user sFTPUser from 211.196.88.223 port 59161 ssh2 Jan 14 11:43:34 host sshd[22068]: Connection reset by 36.239.112.130 port 55796 [preauth] Jan 14 11:44:26 host sshd[22149]: Invalid user pi from 60.38.8.243 port 59465 Jan 14 11:44:26 host sshd[22149]: input_userauth_request: invalid user pi [preauth] Jan 14 11:44:26 host sshd[22149]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:44:26 host sshd[22149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.38.8.243 Jan 14 11:44:28 host sshd[22149]: Failed password for invalid user pi from 60.38.8.243 port 59465 ssh2 Jan 14 11:44:28 host sshd[22149]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:44:31 host sshd[22149]: Failed password for invalid user pi from 60.38.8.243 port 59465 ssh2 Jan 14 11:44:31 host sshd[22149]: Connection reset by 60.38.8.243 port 59465 [preauth] Jan 14 11:44:31 host sshd[22149]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.38.8.243 Jan 14 11:46:30 host sshd[22416]: Did not receive identification string from 92.255.85.115 port 27869 Jan 14 11:51:41 host sshd[23163]: Connection closed by 167.248.133.119 port 34886 [preauth] Jan 14 11:51:59 host sshd[23241]: Invalid user ubnt from 121.186.55.242 port 55955 Jan 14 11:51:59 host sshd[23241]: input_userauth_request: invalid user ubnt [preauth] Jan 14 11:51:59 host sshd[23241]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:51:59 host sshd[23241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.186.55.242 Jan 14 11:52:01 host sshd[23241]: Failed password for invalid user ubnt from 121.186.55.242 port 55955 ssh2 Jan 14 11:52:01 host sshd[23241]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:52:03 host sshd[23241]: Failed password for invalid user ubnt from 121.186.55.242 port 55955 ssh2 Jan 14 11:52:04 host sshd[23241]: Failed password for invalid user ubnt from 121.186.55.242 port 55955 ssh2 Jan 14 11:52:04 host sshd[23241]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:52:07 host sshd[23241]: Failed password for invalid user ubnt from 121.186.55.242 port 55955 ssh2 Jan 14 11:52:07 host sshd[23241]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:52:08 host sshd[23241]: Failed password for invalid user ubnt from 121.186.55.242 port 55955 ssh2 Jan 14 11:54:00 host sshd[23528]: Invalid user ubuntu from 14.137.211.225 port 48560 Jan 14 11:54:00 host sshd[23528]: input_userauth_request: invalid user ubuntu [preauth] Jan 14 11:54:00 host sshd[23528]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:54:00 host sshd[23528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.137.211.225 Jan 14 11:54:02 host sshd[23528]: Failed password for invalid user ubuntu from 14.137.211.225 port 48560 ssh2 Jan 14 11:54:03 host sshd[23528]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:54:04 host sshd[23528]: Failed password for invalid user ubuntu from 14.137.211.225 port 48560 ssh2 Jan 14 11:54:05 host sshd[23528]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:54:08 host sshd[23528]: Failed password for invalid user ubuntu from 14.137.211.225 port 48560 ssh2 Jan 14 11:54:09 host sshd[23528]: Failed password for invalid user ubuntu from 14.137.211.225 port 48560 ssh2 Jan 14 11:54:10 host sshd[23528]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:54:12 host sshd[23528]: Failed password for invalid user ubuntu from 14.137.211.225 port 48560 ssh2 Jan 14 11:54:13 host sshd[23528]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:54:14 host sshd[23528]: Failed password for invalid user ubuntu from 14.137.211.225 port 48560 ssh2 Jan 14 11:54:14 host sshd[23528]: error: maximum authentication attempts exceeded for invalid user ubuntu from 14.137.211.225 port 48560 ssh2 [preauth] Jan 14 11:54:14 host sshd[23528]: Disconnecting: Too many authentication failures [preauth] Jan 14 11:54:14 host sshd[23528]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.137.211.225 Jan 14 11:54:14 host sshd[23528]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 14 11:54:47 host sshd[23710]: Invalid user dx from 194.110.203.109 port 55760 Jan 14 11:54:47 host sshd[23710]: input_userauth_request: invalid user dx [preauth] Jan 14 11:54:47 host sshd[23710]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:54:47 host sshd[23710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 11:54:49 host sshd[23710]: Failed password for invalid user dx from 194.110.203.109 port 55760 ssh2 Jan 14 11:54:52 host sshd[23710]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:54:54 host sshd[23710]: Failed password for invalid user dx from 194.110.203.109 port 55760 ssh2 Jan 14 11:54:57 host sshd[23710]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:54:59 host sshd[23710]: Failed password for invalid user dx from 194.110.203.109 port 55760 ssh2 Jan 14 11:55:02 host sshd[23710]: Connection closed by 194.110.203.109 port 55760 [preauth] Jan 14 11:55:02 host sshd[23710]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 11:58:05 host sshd[24380]: Invalid user hikvision from 175.197.227.16 port 62507 Jan 14 11:58:05 host sshd[24380]: input_userauth_request: invalid user hikvision [preauth] Jan 14 11:58:05 host sshd[24380]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:58:05 host sshd[24380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.197.227.16 Jan 14 11:58:07 host sshd[24380]: Failed password for invalid user hikvision from 175.197.227.16 port 62507 ssh2 Jan 14 11:58:08 host sshd[24380]: pam_unix(sshd:auth): check pass; user unknown Jan 14 11:58:09 host sshd[24380]: Failed password for invalid user hikvision from 175.197.227.16 port 62507 ssh2 Jan 14 11:58:10 host sshd[24380]: Connection reset by 175.197.227.16 port 62507 [preauth] Jan 14 11:58:10 host sshd[24380]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.197.227.16 Jan 14 11:58:51 host sshd[24503]: Bad protocol version identification '' from 115.196.22.156 port 51688 Jan 14 11:58:53 host sshd[24505]: User root from 115.196.22.156 not allowed because not listed in AllowUsers Jan 14 11:58:53 host sshd[24505]: input_userauth_request: invalid user root [preauth] Jan 14 11:58:53 host unix_chkpwd[24511]: password check failed for user (root) Jan 14 11:58:53 host sshd[24505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.196.22.156 user=root Jan 14 11:58:53 host sshd[24505]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 11:58:55 host sshd[24505]: Failed password for invalid user root from 115.196.22.156 port 51694 ssh2 Jan 14 11:58:56 host sshd[24505]: Connection closed by 115.196.22.156 port 51694 [preauth] Jan 14 11:58:57 host sshd[24518]: User root from 115.196.22.156 not allowed because not listed in AllowUsers Jan 14 11:58:57 host sshd[24518]: input_userauth_request: invalid user root [preauth] Jan 14 11:58:58 host unix_chkpwd[24525]: password check failed for user (root) Jan 14 11:58:58 host sshd[24518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.196.22.156 user=root Jan 14 11:58:58 host sshd[24518]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 11:59:00 host sshd[24518]: Failed password for invalid user root from 115.196.22.156 port 51708 ssh2 Jan 14 11:59:00 host sshd[24518]: Connection closed by 115.196.22.156 port 51708 [preauth] Jan 14 11:59:02 host sshd[24529]: User root from 115.196.22.156 not allowed because not listed in AllowUsers Jan 14 11:59:02 host sshd[24529]: input_userauth_request: invalid user root [preauth] Jan 14 11:59:02 host unix_chkpwd[24542]: password check failed for user (root) Jan 14 11:59:02 host sshd[24529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.196.22.156 user=root Jan 14 11:59:02 host sshd[24529]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 11:59:04 host sshd[24529]: Failed password for invalid user root from 115.196.22.156 port 39712 ssh2 Jan 14 12:02:04 host sshd[25180]: Invalid user vadmin from 218.158.219.28 port 62100 Jan 14 12:02:04 host sshd[25180]: input_userauth_request: invalid user vadmin [preauth] Jan 14 12:02:04 host sshd[25180]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:02:04 host sshd[25180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.158.219.28 Jan 14 12:02:06 host sshd[25180]: Failed password for invalid user vadmin from 218.158.219.28 port 62100 ssh2 Jan 14 12:02:07 host sshd[25180]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:02:09 host sshd[25180]: Failed password for invalid user vadmin from 218.158.219.28 port 62100 ssh2 Jan 14 12:02:09 host sshd[25180]: Connection reset by 218.158.219.28 port 62100 [preauth] Jan 14 12:02:09 host sshd[25180]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.158.219.28 Jan 14 12:09:36 host sshd[26802]: Invalid user redlama from 103.176.78.133 port 48178 Jan 14 12:09:36 host sshd[26802]: input_userauth_request: invalid user redlama [preauth] Jan 14 12:09:36 host sshd[26802]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:09:36 host sshd[26802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.78.133 Jan 14 12:09:38 host sshd[26802]: Failed password for invalid user redlama from 103.176.78.133 port 48178 ssh2 Jan 14 12:09:38 host sshd[26802]: Received disconnect from 103.176.78.133 port 48178:11: Bye Bye [preauth] Jan 14 12:09:38 host sshd[26802]: Disconnected from 103.176.78.133 port 48178 [preauth] Jan 14 12:09:40 host sshd[26810]: Invalid user Oracle from 152.32.129.246 port 35500 Jan 14 12:09:40 host sshd[26810]: input_userauth_request: invalid user Oracle [preauth] Jan 14 12:09:40 host sshd[26810]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:09:40 host sshd[26810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.129.246 Jan 14 12:09:42 host sshd[26810]: Failed password for invalid user Oracle from 152.32.129.246 port 35500 ssh2 Jan 14 12:09:42 host sshd[26810]: Received disconnect from 152.32.129.246 port 35500:11: Bye Bye [preauth] Jan 14 12:09:42 host sshd[26810]: Disconnected from 152.32.129.246 port 35500 [preauth] Jan 14 12:11:11 host sshd[27276]: Invalid user sfx from 64.120.121.215 port 53368 Jan 14 12:11:11 host sshd[27276]: input_userauth_request: invalid user sfx [preauth] Jan 14 12:11:11 host sshd[27276]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:11:11 host sshd[27276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.120.121.215 Jan 14 12:11:12 host sshd[27276]: Failed password for invalid user sfx from 64.120.121.215 port 53368 ssh2 Jan 14 12:11:12 host sshd[27276]: Received disconnect from 64.120.121.215 port 53368:11: Bye Bye [preauth] Jan 14 12:11:12 host sshd[27276]: Disconnected from 64.120.121.215 port 53368 [preauth] Jan 14 12:11:23 host sshd[27402]: User root from 89.208.104.97 not allowed because not listed in AllowUsers Jan 14 12:11:23 host sshd[27402]: input_userauth_request: invalid user root [preauth] Jan 14 12:11:23 host unix_chkpwd[27406]: password check failed for user (root) Jan 14 12:11:23 host sshd[27402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.208.104.97 user=root Jan 14 12:11:23 host sshd[27402]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 12:11:24 host sshd[27402]: Failed password for invalid user root from 89.208.104.97 port 56766 ssh2 Jan 14 12:11:24 host sshd[27402]: Received disconnect from 89.208.104.97 port 56766:11: Bye Bye [preauth] Jan 14 12:11:24 host sshd[27402]: Disconnected from 89.208.104.97 port 56766 [preauth] Jan 14 12:12:13 host sshd[27562]: Invalid user zhangnanhai from 103.176.78.26 port 43346 Jan 14 12:12:13 host sshd[27562]: input_userauth_request: invalid user zhangnanhai [preauth] Jan 14 12:12:13 host sshd[27562]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:12:13 host sshd[27562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.78.26 Jan 14 12:12:14 host sshd[27564]: User root from 143.110.234.191 not allowed because not listed in AllowUsers Jan 14 12:12:14 host sshd[27564]: input_userauth_request: invalid user root [preauth] Jan 14 12:12:14 host unix_chkpwd[27571]: password check failed for user (root) Jan 14 12:12:14 host sshd[27564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.234.191 user=root Jan 14 12:12:14 host sshd[27564]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 12:12:15 host sshd[27562]: Failed password for invalid user zhangnanhai from 103.176.78.26 port 43346 ssh2 Jan 14 12:12:15 host sshd[27562]: Received disconnect from 103.176.78.26 port 43346:11: Bye Bye [preauth] Jan 14 12:12:15 host sshd[27562]: Disconnected from 103.176.78.26 port 43346 [preauth] Jan 14 12:12:16 host sshd[27564]: Failed password for invalid user root from 143.110.234.191 port 40904 ssh2 Jan 14 12:12:16 host sshd[27564]: Received disconnect from 143.110.234.191 port 40904:11: Bye Bye [preauth] Jan 14 12:12:16 host sshd[27564]: Disconnected from 143.110.234.191 port 40904 [preauth] Jan 14 12:13:15 host sshd[27775]: Invalid user admin from 139.59.27.92 port 33744 Jan 14 12:13:15 host sshd[27775]: input_userauth_request: invalid user admin [preauth] Jan 14 12:13:15 host sshd[27775]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:13:15 host sshd[27775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.27.92 Jan 14 12:13:17 host sshd[27775]: Failed password for invalid user admin from 139.59.27.92 port 33744 ssh2 Jan 14 12:13:17 host sshd[27775]: Received disconnect from 139.59.27.92 port 33744:11: Bye Bye [preauth] Jan 14 12:13:17 host sshd[27775]: Disconnected from 139.59.27.92 port 33744 [preauth] Jan 14 12:13:43 host sshd[28018]: Invalid user master from 213.55.97.217 port 44886 Jan 14 12:13:43 host sshd[28018]: input_userauth_request: invalid user master [preauth] Jan 14 12:13:43 host sshd[28018]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:13:43 host sshd[28018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.55.97.217 Jan 14 12:13:45 host sshd[28018]: Failed password for invalid user master from 213.55.97.217 port 44886 ssh2 Jan 14 12:13:45 host sshd[28018]: Received disconnect from 213.55.97.217 port 44886:11: Bye Bye [preauth] Jan 14 12:13:45 host sshd[28018]: Disconnected from 213.55.97.217 port 44886 [preauth] Jan 14 12:14:11 host sshd[28073]: Invalid user jqgao from 177.200.212.34 port 49855 Jan 14 12:14:11 host sshd[28073]: input_userauth_request: invalid user jqgao [preauth] Jan 14 12:14:11 host sshd[28073]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:14:11 host sshd[28073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.200.212.34 Jan 14 12:14:13 host sshd[28073]: Failed password for invalid user jqgao from 177.200.212.34 port 49855 ssh2 Jan 14 12:14:13 host sshd[28073]: Received disconnect from 177.200.212.34 port 49855:11: Bye Bye [preauth] Jan 14 12:14:13 host sshd[28073]: Disconnected from 177.200.212.34 port 49855 [preauth] Jan 14 12:14:23 host sshd[28092]: Invalid user black from 202.139.199.93 port 35994 Jan 14 12:14:23 host sshd[28092]: input_userauth_request: invalid user black [preauth] Jan 14 12:14:23 host sshd[28092]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:14:23 host sshd[28092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.139.199.93 Jan 14 12:14:25 host sshd[28092]: Failed password for invalid user black from 202.139.199.93 port 35994 ssh2 Jan 14 12:14:25 host sshd[28092]: Received disconnect from 202.139.199.93 port 35994:11: Bye Bye [preauth] Jan 14 12:14:25 host sshd[28092]: Disconnected from 202.139.199.93 port 35994 [preauth] Jan 14 12:14:46 host sshd[28155]: Invalid user sfx from 103.176.78.133 port 35110 Jan 14 12:14:46 host sshd[28155]: input_userauth_request: invalid user sfx [preauth] Jan 14 12:14:46 host sshd[28155]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:14:46 host sshd[28155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.78.133 Jan 14 12:14:49 host sshd[28164]: User root from 110.227.254.14 not allowed because not listed in AllowUsers Jan 14 12:14:49 host sshd[28164]: input_userauth_request: invalid user root [preauth] Jan 14 12:14:49 host unix_chkpwd[28167]: password check failed for user (root) Jan 14 12:14:49 host sshd[28164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.227.254.14 user=root Jan 14 12:14:49 host sshd[28164]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 12:14:49 host sshd[28155]: Failed password for invalid user sfx from 103.176.78.133 port 35110 ssh2 Jan 14 12:14:49 host sshd[28155]: Received disconnect from 103.176.78.133 port 35110:11: Bye Bye [preauth] Jan 14 12:14:49 host sshd[28155]: Disconnected from 103.176.78.133 port 35110 [preauth] Jan 14 12:14:50 host sshd[28164]: Failed password for invalid user root from 110.227.254.14 port 38698 ssh2 Jan 14 12:14:50 host sshd[28164]: Received disconnect from 110.227.254.14 port 38698:11: Bye Bye [preauth] Jan 14 12:14:50 host sshd[28164]: Disconnected from 110.227.254.14 port 38698 [preauth] Jan 14 12:15:03 host sshd[28219]: Invalid user andras from 152.32.129.246 port 58206 Jan 14 12:15:03 host sshd[28219]: input_userauth_request: invalid user andras [preauth] Jan 14 12:15:03 host sshd[28219]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:15:03 host sshd[28219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.129.246 Jan 14 12:15:05 host sshd[28219]: Failed password for invalid user andras from 152.32.129.246 port 58206 ssh2 Jan 14 12:15:05 host sshd[28219]: Received disconnect from 152.32.129.246 port 58206:11: Bye Bye [preauth] Jan 14 12:15:05 host sshd[28219]: Disconnected from 152.32.129.246 port 58206 [preauth] Jan 14 12:15:48 host sshd[28337]: Invalid user redlama from 64.120.121.215 port 41642 Jan 14 12:15:48 host sshd[28337]: input_userauth_request: invalid user redlama [preauth] Jan 14 12:15:48 host sshd[28337]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:15:48 host sshd[28337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.120.121.215 Jan 14 12:15:48 host sshd[28334]: Invalid user customer from 143.110.234.191 port 51190 Jan 14 12:15:48 host sshd[28334]: input_userauth_request: invalid user customer [preauth] Jan 14 12:15:48 host sshd[28334]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:15:48 host sshd[28334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.234.191 Jan 14 12:15:50 host sshd[28337]: Failed password for invalid user redlama from 64.120.121.215 port 41642 ssh2 Jan 14 12:15:50 host sshd[28337]: Received disconnect from 64.120.121.215 port 41642:11: Bye Bye [preauth] Jan 14 12:15:50 host sshd[28337]: Disconnected from 64.120.121.215 port 41642 [preauth] Jan 14 12:15:50 host sshd[28334]: Failed password for invalid user customer from 143.110.234.191 port 51190 ssh2 Jan 14 12:15:50 host sshd[28334]: Received disconnect from 143.110.234.191 port 51190:11: Bye Bye [preauth] Jan 14 12:15:50 host sshd[28334]: Disconnected from 143.110.234.191 port 51190 [preauth] Jan 14 12:16:02 host sshd[28412]: Invalid user black from 103.176.78.26 port 57716 Jan 14 12:16:02 host sshd[28412]: input_userauth_request: invalid user black [preauth] Jan 14 12:16:02 host sshd[28412]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:16:02 host sshd[28412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.78.26 Jan 14 12:16:04 host sshd[28412]: Failed password for invalid user black from 103.176.78.26 port 57716 ssh2 Jan 14 12:16:04 host sshd[28412]: Received disconnect from 103.176.78.26 port 57716:11: Bye Bye [preauth] Jan 14 12:16:04 host sshd[28412]: Disconnected from 103.176.78.26 port 57716 [preauth] Jan 14 12:16:12 host sshd[28426]: Invalid user xschen from 89.208.104.97 port 56938 Jan 14 12:16:12 host sshd[28426]: input_userauth_request: invalid user xschen [preauth] Jan 14 12:16:12 host sshd[28426]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:16:12 host sshd[28426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.208.104.97 Jan 14 12:16:14 host sshd[28426]: Failed password for invalid user xschen from 89.208.104.97 port 56938 ssh2 Jan 14 12:16:14 host sshd[28426]: Received disconnect from 89.208.104.97 port 56938:11: Bye Bye [preauth] Jan 14 12:16:14 host sshd[28426]: Disconnected from 89.208.104.97 port 56938 [preauth] Jan 14 12:16:16 host sshd[28440]: Invalid user jiangzehang from 103.176.78.133 port 49928 Jan 14 12:16:16 host sshd[28440]: input_userauth_request: invalid user jiangzehang [preauth] Jan 14 12:16:16 host sshd[28440]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:16:16 host sshd[28440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.78.133 Jan 14 12:16:18 host sshd[28440]: Failed password for invalid user jiangzehang from 103.176.78.133 port 49928 ssh2 Jan 14 12:16:18 host sshd[28440]: Received disconnect from 103.176.78.133 port 49928:11: Bye Bye [preauth] Jan 14 12:16:18 host sshd[28440]: Disconnected from 103.176.78.133 port 49928 [preauth] Jan 14 12:16:21 host sshd[28509]: Invalid user amber from 177.200.212.34 port 37070 Jan 14 12:16:21 host sshd[28509]: input_userauth_request: invalid user amber [preauth] Jan 14 12:16:21 host sshd[28509]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:16:21 host sshd[28509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.200.212.34 Jan 14 12:16:24 host sshd[28509]: Failed password for invalid user amber from 177.200.212.34 port 37070 ssh2 Jan 14 12:16:24 host sshd[28509]: Received disconnect from 177.200.212.34 port 37070:11: Bye Bye [preauth] Jan 14 12:16:24 host sshd[28509]: Disconnected from 177.200.212.34 port 37070 [preauth] Jan 14 12:16:33 host sshd[28556]: Invalid user nsd02 from 152.32.129.246 port 56790 Jan 14 12:16:33 host sshd[28556]: input_userauth_request: invalid user nsd02 [preauth] Jan 14 12:16:33 host sshd[28556]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:16:33 host sshd[28556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.129.246 Jan 14 12:16:36 host sshd[28556]: Failed password for invalid user nsd02 from 152.32.129.246 port 56790 ssh2 Jan 14 12:16:36 host sshd[28556]: Received disconnect from 152.32.129.246 port 56790:11: Bye Bye [preauth] Jan 14 12:16:36 host sshd[28556]: Disconnected from 152.32.129.246 port 56790 [preauth] Jan 14 12:16:43 host sshd[28606]: Invalid user fyy from 213.55.97.217 port 34391 Jan 14 12:16:43 host sshd[28606]: input_userauth_request: invalid user fyy [preauth] Jan 14 12:16:43 host sshd[28606]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:16:43 host sshd[28606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.55.97.217 Jan 14 12:16:45 host sshd[28606]: Failed password for invalid user fyy from 213.55.97.217 port 34391 ssh2 Jan 14 12:16:45 host sshd[28606]: Received disconnect from 213.55.97.217 port 34391:11: Bye Bye [preauth] Jan 14 12:16:45 host sshd[28606]: Disconnected from 213.55.97.217 port 34391 [preauth] Jan 14 12:17:09 host sshd[28661]: Invalid user nsd02 from 64.120.121.215 port 36034 Jan 14 12:17:09 host sshd[28661]: input_userauth_request: invalid user nsd02 [preauth] Jan 14 12:17:09 host sshd[28661]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:17:09 host sshd[28661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.120.121.215 Jan 14 12:17:10 host sshd[28663]: Invalid user git from 110.227.254.14 port 36498 Jan 14 12:17:10 host sshd[28663]: input_userauth_request: invalid user git [preauth] Jan 14 12:17:10 host sshd[28663]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:17:10 host sshd[28663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.227.254.14 Jan 14 12:17:12 host sshd[28663]: Failed password for invalid user git from 110.227.254.14 port 36498 ssh2 Jan 14 12:17:12 host sshd[28661]: Failed password for invalid user nsd02 from 64.120.121.215 port 36034 ssh2 Jan 14 12:17:12 host sshd[28663]: Received disconnect from 110.227.254.14 port 36498:11: Bye Bye [preauth] Jan 14 12:17:12 host sshd[28663]: Disconnected from 110.227.254.14 port 36498 [preauth] Jan 14 12:17:12 host sshd[28697]: User root from 139.59.27.92 not allowed because not listed in AllowUsers Jan 14 12:17:12 host sshd[28697]: input_userauth_request: invalid user root [preauth] Jan 14 12:17:12 host sshd[28661]: Received disconnect from 64.120.121.215 port 36034:11: Bye Bye [preauth] Jan 14 12:17:12 host sshd[28661]: Disconnected from 64.120.121.215 port 36034 [preauth] Jan 14 12:17:12 host unix_chkpwd[28700]: password check failed for user (root) Jan 14 12:17:12 host sshd[28697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.27.92 user=root Jan 14 12:17:12 host sshd[28697]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 12:17:14 host sshd[28697]: Failed password for invalid user root from 139.59.27.92 port 44500 ssh2 Jan 14 12:17:14 host sshd[28697]: Received disconnect from 139.59.27.92 port 44500:11: Bye Bye [preauth] Jan 14 12:17:14 host sshd[28697]: Disconnected from 139.59.27.92 port 44500 [preauth] Jan 14 12:17:15 host sshd[28701]: Connection closed by 172.105.128.13 port 20082 [preauth] Jan 14 12:17:16 host sshd[28770]: Did not receive identification string from 172.105.128.13 port 20086 Jan 14 12:17:20 host sshd[28775]: Connection closed by 172.105.128.13 port 20098 [preauth] Jan 14 12:17:31 host sshd[28866]: Invalid user git from 103.176.78.26 port 56356 Jan 14 12:17:31 host sshd[28866]: input_userauth_request: invalid user git [preauth] Jan 14 12:17:31 host sshd[28866]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:17:31 host sshd[28866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.78.26 Jan 14 12:17:32 host sshd[28870]: Invalid user Yan from 202.139.199.93 port 36682 Jan 14 12:17:32 host sshd[28870]: input_userauth_request: invalid user Yan [preauth] Jan 14 12:17:32 host sshd[28870]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:17:32 host sshd[28870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.139.199.93 Jan 14 12:17:33 host sshd[28866]: Failed password for invalid user git from 103.176.78.26 port 56356 ssh2 Jan 14 12:17:34 host sshd[28866]: Received disconnect from 103.176.78.26 port 56356:11: Bye Bye [preauth] Jan 14 12:17:34 host sshd[28866]: Disconnected from 103.176.78.26 port 56356 [preauth] Jan 14 12:17:34 host sshd[28870]: Failed password for invalid user Yan from 202.139.199.93 port 36682 ssh2 Jan 14 12:17:34 host sshd[28870]: Received disconnect from 202.139.199.93 port 36682:11: Bye Bye [preauth] Jan 14 12:17:34 host sshd[28870]: Disconnected from 202.139.199.93 port 36682 [preauth] Jan 14 12:17:51 host sshd[28934]: Invalid user wwwroot from 177.200.212.34 port 50424 Jan 14 12:17:51 host sshd[28934]: input_userauth_request: invalid user wwwroot [preauth] Jan 14 12:17:51 host sshd[28934]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:17:51 host sshd[28934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.200.212.34 Jan 14 12:17:52 host sshd[28934]: Failed password for invalid user wwwroot from 177.200.212.34 port 50424 ssh2 Jan 14 12:17:53 host sshd[28934]: Received disconnect from 177.200.212.34 port 50424:11: Bye Bye [preauth] Jan 14 12:17:53 host sshd[28934]: Disconnected from 177.200.212.34 port 50424 [preauth] Jan 14 12:18:19 host sshd[29022]: Invalid user zrf from 213.55.97.217 port 47402 Jan 14 12:18:19 host sshd[29022]: input_userauth_request: invalid user zrf [preauth] Jan 14 12:18:19 host sshd[29022]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:18:19 host sshd[29022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.55.97.217 Jan 14 12:18:21 host sshd[29022]: Failed password for invalid user zrf from 213.55.97.217 port 47402 ssh2 Jan 14 12:18:21 host sshd[29022]: Received disconnect from 213.55.97.217 port 47402:11: Bye Bye [preauth] Jan 14 12:18:21 host sshd[29022]: Disconnected from 213.55.97.217 port 47402 [preauth] Jan 14 12:18:50 host sshd[29221]: Invalid user zhangnanhai from 202.139.199.93 port 53038 Jan 14 12:18:50 host sshd[29221]: input_userauth_request: invalid user zhangnanhai [preauth] Jan 14 12:18:50 host sshd[29221]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:18:50 host sshd[29221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.139.199.93 Jan 14 12:18:51 host sshd[29221]: Failed password for invalid user zhangnanhai from 202.139.199.93 port 53038 ssh2 Jan 14 12:18:51 host sshd[29221]: Received disconnect from 202.139.199.93 port 53038:11: Bye Bye [preauth] Jan 14 12:18:51 host sshd[29221]: Disconnected from 202.139.199.93 port 53038 [preauth] Jan 14 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 12:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 12:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 12:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=gifterman user-2=palco123 user-3=kottayamcalldriv user-4=phmetals user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=straightcurve user-10=wwwletsstalkfood user-11=vfmassets user-12=wwwtestugo user-13=shalinijames user-14=pmcresources user-15=remysagr user-16=disposeat user-17=wwwkmaorg user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 12:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9yWWBQjVzxFBcdDg.~ Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9yWWBQjVzxFBcdDg.~' Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9yWWBQjVzxFBcdDg.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 12:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 12:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 12:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 12:26:01 host sshd[30473]: Connection reset by 79.9.109.164 port 59011 [preauth] Jan 14 12:30:50 host sshd[31139]: Invalid user liyi from 192.3.81.232 port 44790 Jan 14 12:30:50 host sshd[31139]: input_userauth_request: invalid user liyi [preauth] Jan 14 12:30:50 host sshd[31139]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:30:50 host sshd[31139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.81.232 Jan 14 12:30:51 host sshd[31139]: Failed password for invalid user liyi from 192.3.81.232 port 44790 ssh2 Jan 14 12:30:52 host sshd[31139]: Received disconnect from 192.3.81.232 port 44790:11: Bye Bye [preauth] Jan 14 12:30:52 host sshd[31139]: Disconnected from 192.3.81.232 port 44790 [preauth] Jan 14 12:31:58 host sshd[31253]: Invalid user yueyiran from 161.35.24.244 port 59348 Jan 14 12:31:58 host sshd[31253]: input_userauth_request: invalid user yueyiran [preauth] Jan 14 12:31:58 host sshd[31253]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:31:58 host sshd[31253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.24.244 Jan 14 12:32:00 host sshd[31253]: Failed password for invalid user yueyiran from 161.35.24.244 port 59348 ssh2 Jan 14 12:32:00 host sshd[31253]: Received disconnect from 161.35.24.244 port 59348:11: Bye Bye [preauth] Jan 14 12:32:00 host sshd[31253]: Disconnected from 161.35.24.244 port 59348 [preauth] Jan 14 12:36:56 host sshd[31932]: User root from 192.3.81.232 not allowed because not listed in AllowUsers Jan 14 12:36:56 host sshd[31932]: input_userauth_request: invalid user root [preauth] Jan 14 12:36:56 host unix_chkpwd[31935]: password check failed for user (root) Jan 14 12:36:56 host sshd[31932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.81.232 user=root Jan 14 12:36:56 host sshd[31932]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 12:36:58 host sshd[31932]: Failed password for invalid user root from 192.3.81.232 port 39404 ssh2 Jan 14 12:36:58 host sshd[31932]: Received disconnect from 192.3.81.232 port 39404:11: Bye Bye [preauth] Jan 14 12:36:58 host sshd[31932]: Disconnected from 192.3.81.232 port 39404 [preauth] Jan 14 12:37:14 host sshd[31994]: User root from 161.35.24.244 not allowed because not listed in AllowUsers Jan 14 12:37:14 host sshd[31994]: input_userauth_request: invalid user root [preauth] Jan 14 12:37:14 host unix_chkpwd[31997]: password check failed for user (root) Jan 14 12:37:14 host sshd[31994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.24.244 user=root Jan 14 12:37:14 host sshd[31994]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 12:37:16 host sshd[31994]: Failed password for invalid user root from 161.35.24.244 port 50010 ssh2 Jan 14 12:37:16 host sshd[31994]: Received disconnect from 161.35.24.244 port 50010:11: Bye Bye [preauth] Jan 14 12:37:16 host sshd[31994]: Disconnected from 161.35.24.244 port 50010 [preauth] Jan 14 12:37:25 host sshd[32040]: Invalid user halts from 216.10.245.180 port 45962 Jan 14 12:37:25 host sshd[32040]: input_userauth_request: invalid user halts [preauth] Jan 14 12:37:25 host sshd[32040]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:37:25 host sshd[32040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.10.245.180 Jan 14 12:37:27 host sshd[32040]: Failed password for invalid user halts from 216.10.245.180 port 45962 ssh2 Jan 14 12:37:27 host sshd[32040]: Received disconnect from 216.10.245.180 port 45962:11: Bye Bye [preauth] Jan 14 12:37:27 host sshd[32040]: Disconnected from 216.10.245.180 port 45962 [preauth] Jan 14 12:39:04 host sshd[32265]: Invalid user developer from 216.10.245.180 port 40326 Jan 14 12:39:04 host sshd[32265]: input_userauth_request: invalid user developer [preauth] Jan 14 12:39:04 host sshd[32265]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:39:04 host sshd[32265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.10.245.180 Jan 14 12:39:06 host sshd[32265]: Failed password for invalid user developer from 216.10.245.180 port 40326 ssh2 Jan 14 12:39:06 host sshd[32265]: Received disconnect from 216.10.245.180 port 40326:11: Bye Bye [preauth] Jan 14 12:39:06 host sshd[32265]: Disconnected from 216.10.245.180 port 40326 [preauth] Jan 14 12:40:15 host sshd[32412]: Invalid user yuanjial from 216.10.245.180 port 60596 Jan 14 12:40:15 host sshd[32412]: input_userauth_request: invalid user yuanjial [preauth] Jan 14 12:40:15 host sshd[32412]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:40:15 host sshd[32412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.10.245.180 Jan 14 12:40:17 host sshd[32412]: Failed password for invalid user yuanjial from 216.10.245.180 port 60596 ssh2 Jan 14 12:40:17 host sshd[32412]: Received disconnect from 216.10.245.180 port 60596:11: Bye Bye [preauth] Jan 14 12:40:17 host sshd[32412]: Disconnected from 216.10.245.180 port 60596 [preauth] Jan 14 12:54:50 host sshd[2194]: Invalid user ftpuser from 31.41.244.124 port 16266 Jan 14 12:54:50 host sshd[2194]: input_userauth_request: invalid user ftpuser [preauth] Jan 14 12:54:50 host sshd[2194]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:54:50 host sshd[2194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 14 12:54:53 host sshd[2194]: Failed password for invalid user ftpuser from 31.41.244.124 port 16266 ssh2 Jan 14 12:54:53 host sshd[2194]: Received disconnect from 31.41.244.124 port 16266:11: Client disconnecting normally [preauth] Jan 14 12:54:53 host sshd[2194]: Disconnected from 31.41.244.124 port 16266 [preauth] Jan 14 12:54:54 host sshd[2201]: Invalid user admin from 31.41.244.124 port 19847 Jan 14 12:54:54 host sshd[2201]: input_userauth_request: invalid user admin [preauth] Jan 14 12:54:54 host sshd[2201]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:54:54 host sshd[2201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 14 12:54:55 host sshd[2201]: Failed password for invalid user admin from 31.41.244.124 port 19847 ssh2 Jan 14 12:54:56 host sshd[2201]: Received disconnect from 31.41.244.124 port 19847:11: Client disconnecting normally [preauth] Jan 14 12:54:56 host sshd[2201]: Disconnected from 31.41.244.124 port 19847 [preauth] Jan 14 12:54:57 host sshd[2209]: Invalid user admin from 31.41.244.124 port 23232 Jan 14 12:54:57 host sshd[2209]: input_userauth_request: invalid user admin [preauth] Jan 14 12:54:57 host sshd[2209]: pam_unix(sshd:auth): check pass; user unknown Jan 14 12:54:57 host sshd[2209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 14 12:54:59 host sshd[2209]: Failed password for invalid user admin from 31.41.244.124 port 23232 ssh2 Jan 14 12:54:59 host sshd[2209]: Received disconnect from 31.41.244.124 port 23232:11: Client disconnecting normally [preauth] Jan 14 12:54:59 host sshd[2209]: Disconnected from 31.41.244.124 port 23232 [preauth] Jan 14 12:55:15 host sshd[2281]: Connection reset by 198.235.24.58 port 62098 [preauth] Jan 14 13:06:43 host sshd[4019]: Invalid user pi from 113.192.108.39 port 56303 Jan 14 13:06:43 host sshd[4019]: input_userauth_request: invalid user pi [preauth] Jan 14 13:06:43 host sshd[4019]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:06:43 host sshd[4019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.192.108.39 Jan 14 13:06:45 host sshd[4019]: Failed password for invalid user pi from 113.192.108.39 port 56303 ssh2 Jan 14 13:06:46 host sshd[4019]: Connection reset by 113.192.108.39 port 56303 [preauth] Jan 14 13:11:42 host sshd[4654]: Invalid user admin from 42.190.165.88 port 51893 Jan 14 13:11:42 host sshd[4654]: input_userauth_request: invalid user admin [preauth] Jan 14 13:11:42 host sshd[4654]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:11:42 host sshd[4654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.190.165.88 Jan 14 13:11:44 host sshd[4654]: Failed password for invalid user admin from 42.190.165.88 port 51893 ssh2 Jan 14 13:11:44 host sshd[4654]: Failed password for invalid user admin from 42.190.165.88 port 51893 ssh2 Jan 14 13:11:44 host sshd[4654]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:11:46 host sshd[4654]: Failed password for invalid user admin from 42.190.165.88 port 51893 ssh2 Jan 14 13:11:47 host sshd[4654]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:11:49 host sshd[4654]: Failed password for invalid user admin from 42.190.165.88 port 51893 ssh2 Jan 14 13:11:49 host sshd[4654]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:11:51 host sshd[4654]: Failed password for invalid user admin from 42.190.165.88 port 51893 ssh2 Jan 14 13:11:51 host sshd[4654]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:11:54 host sshd[4654]: Failed password for invalid user admin from 42.190.165.88 port 51893 ssh2 Jan 14 13:11:54 host sshd[4654]: error: maximum authentication attempts exceeded for invalid user admin from 42.190.165.88 port 51893 ssh2 [preauth] Jan 14 13:11:54 host sshd[4654]: Disconnecting: Too many authentication failures [preauth] Jan 14 13:11:54 host sshd[4654]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.190.165.88 Jan 14 13:11:54 host sshd[4654]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 14 13:17:41 host sshd[5423]: Invalid user zyfwp from 125.25.222.122 port 52700 Jan 14 13:17:41 host sshd[5423]: input_userauth_request: invalid user zyfwp [preauth] Jan 14 13:17:41 host sshd[5423]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:17:41 host sshd[5423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.25.222.122 Jan 14 13:17:44 host sshd[5423]: Failed password for invalid user zyfwp from 125.25.222.122 port 52700 ssh2 Jan 14 13:17:44 host sshd[5423]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:17:46 host sshd[5423]: Failed password for invalid user zyfwp from 125.25.222.122 port 52700 ssh2 Jan 14 13:17:47 host sshd[5423]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:17:49 host sshd[5423]: Failed password for invalid user zyfwp from 125.25.222.122 port 52700 ssh2 Jan 14 13:17:50 host sshd[5423]: Connection closed by 125.25.222.122 port 52700 [preauth] Jan 14 13:17:50 host sshd[5423]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.25.222.122 Jan 14 13:20:31 host sshd[5717]: Invalid user johnny from 107.189.30.59 port 60796 Jan 14 13:20:31 host sshd[5717]: input_userauth_request: invalid user johnny [preauth] Jan 14 13:20:31 host sshd[5717]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:20:31 host sshd[5717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 14 13:20:33 host sshd[5717]: Failed password for invalid user johnny from 107.189.30.59 port 60796 ssh2 Jan 14 13:20:33 host sshd[5717]: Connection closed by 107.189.30.59 port 60796 [preauth] Jan 14 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 13:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=wwwletsstalkfood user-11=straightcurve user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 13:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DqBWvrw9y6DOSFPj.~ Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DqBWvrw9y6DOSFPj.~' Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DqBWvrw9y6DOSFPj.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 13:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 13:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 13:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 13:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 13:34:28 host sshd[7599]: Invalid user pi from 69.251.176.74 port 60347 Jan 14 13:34:28 host sshd[7599]: input_userauth_request: invalid user pi [preauth] Jan 14 13:34:28 host sshd[7599]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:34:28 host sshd[7599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.251.176.74 Jan 14 13:34:30 host sshd[7599]: Failed password for invalid user pi from 69.251.176.74 port 60347 ssh2 Jan 14 13:34:31 host sshd[7599]: Connection reset by 69.251.176.74 port 60347 [preauth] Jan 14 13:35:35 host sshd[7782]: Invalid user gitlab-runner from 71.83.12.22 port 61223 Jan 14 13:35:35 host sshd[7782]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 14 13:35:35 host sshd[7782]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:35:35 host sshd[7782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.83.12.22 Jan 14 13:35:36 host sshd[7782]: Failed password for invalid user gitlab-runner from 71.83.12.22 port 61223 ssh2 Jan 14 13:35:37 host sshd[7782]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:35:39 host sshd[7782]: Failed password for invalid user gitlab-runner from 71.83.12.22 port 61223 ssh2 Jan 14 13:35:40 host sshd[7782]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:35:42 host sshd[7782]: Failed password for invalid user gitlab-runner from 71.83.12.22 port 61223 ssh2 Jan 14 13:35:43 host sshd[7782]: Failed password for invalid user gitlab-runner from 71.83.12.22 port 61223 ssh2 Jan 14 13:35:43 host sshd[7782]: Connection closed by 71.83.12.22 port 61223 [preauth] Jan 14 13:35:43 host sshd[7782]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.83.12.22 Jan 14 13:41:45 host sshd[8618]: Invalid user dy from 194.110.203.109 port 52670 Jan 14 13:41:45 host sshd[8618]: input_userauth_request: invalid user dy [preauth] Jan 14 13:41:45 host sshd[8618]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:41:45 host sshd[8618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 13:41:48 host sshd[8618]: Failed password for invalid user dy from 194.110.203.109 port 52670 ssh2 Jan 14 13:41:51 host sshd[8618]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:41:53 host sshd[8618]: Failed password for invalid user dy from 194.110.203.109 port 52670 ssh2 Jan 14 13:41:56 host sshd[8618]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:41:58 host sshd[8618]: Failed password for invalid user dy from 194.110.203.109 port 52670 ssh2 Jan 14 13:42:01 host sshd[8618]: Connection closed by 194.110.203.109 port 52670 [preauth] Jan 14 13:42:01 host sshd[8618]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 13:42:46 host sshd[8719]: Invalid user admin from 121.128.180.136 port 60564 Jan 14 13:42:46 host sshd[8719]: input_userauth_request: invalid user admin [preauth] Jan 14 13:42:46 host sshd[8719]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:42:46 host sshd[8719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.180.136 Jan 14 13:42:46 host sshd[8721]: User root from 220.135.115.114 not allowed because not listed in AllowUsers Jan 14 13:42:46 host sshd[8721]: input_userauth_request: invalid user root [preauth] Jan 14 13:42:46 host unix_chkpwd[8726]: password check failed for user (root) Jan 14 13:42:46 host sshd[8721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.115.114 user=root Jan 14 13:42:46 host sshd[8721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:42:48 host sshd[8719]: Failed password for invalid user admin from 121.128.180.136 port 60564 ssh2 Jan 14 13:42:48 host sshd[8721]: Failed password for invalid user root from 220.135.115.114 port 46823 ssh2 Jan 14 13:42:49 host unix_chkpwd[8734]: password check failed for user (root) Jan 14 13:42:49 host sshd[8721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:42:51 host sshd[8721]: Failed password for invalid user root from 220.135.115.114 port 46823 ssh2 Jan 14 13:42:52 host unix_chkpwd[8737]: password check failed for user (root) Jan 14 13:42:52 host sshd[8721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:42:53 host sshd[8719]: Failed password for invalid user admin from 121.128.180.136 port 60564 ssh2 Jan 14 13:42:53 host sshd[8719]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:42:54 host sshd[8721]: Failed password for invalid user root from 220.135.115.114 port 46823 ssh2 Jan 14 13:42:55 host sshd[8719]: Failed password for invalid user admin from 121.128.180.136 port 60564 ssh2 Jan 14 13:42:55 host unix_chkpwd[8741]: password check failed for user (root) Jan 14 13:42:55 host sshd[8721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:42:55 host sshd[8719]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:42:57 host sshd[8721]: Failed password for invalid user root from 220.135.115.114 port 46823 ssh2 Jan 14 13:42:57 host sshd[8719]: Failed password for invalid user admin from 121.128.180.136 port 60564 ssh2 Jan 14 13:42:58 host sshd[8719]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:43:00 host sshd[8719]: Failed password for invalid user admin from 121.128.180.136 port 60564 ssh2 Jan 14 13:43:46 host sshd[9000]: User root from 188.54.252.19 not allowed because not listed in AllowUsers Jan 14 13:43:46 host sshd[9000]: input_userauth_request: invalid user root [preauth] Jan 14 13:43:46 host unix_chkpwd[9005]: password check failed for user (root) Jan 14 13:43:46 host sshd[9000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.54.252.19 user=root Jan 14 13:43:46 host sshd[9000]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:43:48 host sshd[9000]: Failed password for invalid user root from 188.54.252.19 port 43452 ssh2 Jan 14 13:43:49 host unix_chkpwd[9010]: password check failed for user (root) Jan 14 13:43:49 host sshd[9000]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:43:51 host sshd[9000]: Failed password for invalid user root from 188.54.252.19 port 43452 ssh2 Jan 14 13:43:51 host unix_chkpwd[9015]: password check failed for user (root) Jan 14 13:43:51 host sshd[9000]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:43:53 host sshd[9000]: Failed password for invalid user root from 188.54.252.19 port 43452 ssh2 Jan 14 13:43:55 host unix_chkpwd[9025]: password check failed for user (root) Jan 14 13:43:55 host sshd[9000]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:43:57 host sshd[9000]: Failed password for invalid user root from 188.54.252.19 port 43452 ssh2 Jan 14 13:46:28 host sshd[9627]: Invalid user xmy from 197.153.57.103 port 42102 Jan 14 13:46:28 host sshd[9627]: input_userauth_request: invalid user xmy [preauth] Jan 14 13:46:28 host sshd[9627]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:46:28 host sshd[9627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.153.57.103 Jan 14 13:46:31 host sshd[9627]: Failed password for invalid user xmy from 197.153.57.103 port 42102 ssh2 Jan 14 13:46:31 host sshd[9627]: Received disconnect from 197.153.57.103 port 42102:11: Bye Bye [preauth] Jan 14 13:46:31 host sshd[9627]: Disconnected from 197.153.57.103 port 42102 [preauth] Jan 14 13:46:51 host sshd[9686]: Invalid user xmy from 167.172.148.74 port 46862 Jan 14 13:46:51 host sshd[9686]: input_userauth_request: invalid user xmy [preauth] Jan 14 13:46:51 host sshd[9686]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:46:51 host sshd[9686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.148.74 Jan 14 13:46:54 host sshd[9686]: Failed password for invalid user xmy from 167.172.148.74 port 46862 ssh2 Jan 14 13:46:54 host sshd[9686]: Received disconnect from 167.172.148.74 port 46862:11: Bye Bye [preauth] Jan 14 13:46:54 host sshd[9686]: Disconnected from 167.172.148.74 port 46862 [preauth] Jan 14 13:47:54 host sshd[9788]: Invalid user wwwlogs from 186.10.245.152 port 37124 Jan 14 13:47:54 host sshd[9788]: input_userauth_request: invalid user wwwlogs [preauth] Jan 14 13:47:54 host sshd[9788]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:47:54 host sshd[9788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.245.152 Jan 14 13:47:56 host sshd[9788]: Failed password for invalid user wwwlogs from 186.10.245.152 port 37124 ssh2 Jan 14 13:47:56 host sshd[9788]: Received disconnect from 186.10.245.152 port 37124:11: Bye Bye [preauth] Jan 14 13:47:56 host sshd[9788]: Disconnected from 186.10.245.152 port 37124 [preauth] Jan 14 13:48:36 host sshd[9883]: Invalid user txiang from 143.110.168.248 port 54710 Jan 14 13:48:36 host sshd[9883]: input_userauth_request: invalid user txiang [preauth] Jan 14 13:48:36 host sshd[9883]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:48:36 host sshd[9883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.168.248 Jan 14 13:48:37 host sshd[9883]: Failed password for invalid user txiang from 143.110.168.248 port 54710 ssh2 Jan 14 13:48:38 host sshd[9883]: Received disconnect from 143.110.168.248 port 54710:11: Bye Bye [preauth] Jan 14 13:48:38 host sshd[9883]: Disconnected from 143.110.168.248 port 54710 [preauth] Jan 14 13:48:51 host sshd[9898]: Invalid user bad from 134.17.16.40 port 39631 Jan 14 13:48:51 host sshd[9898]: input_userauth_request: invalid user bad [preauth] Jan 14 13:48:51 host sshd[9898]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:48:51 host sshd[9898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 Jan 14 13:48:53 host sshd[9898]: Failed password for invalid user bad from 134.17.16.40 port 39631 ssh2 Jan 14 13:48:53 host sshd[9898]: Received disconnect from 134.17.16.40 port 39631:11: Bye Bye [preauth] Jan 14 13:48:53 host sshd[9898]: Disconnected from 134.17.16.40 port 39631 [preauth] Jan 14 13:50:35 host sshd[10163]: Invalid user takagi from 97.74.95.243 port 39118 Jan 14 13:50:35 host sshd[10163]: input_userauth_request: invalid user takagi [preauth] Jan 14 13:50:35 host sshd[10163]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:50:35 host sshd[10163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.95.243 Jan 14 13:50:37 host sshd[10163]: Failed password for invalid user takagi from 97.74.95.243 port 39118 ssh2 Jan 14 13:50:37 host sshd[10163]: Received disconnect from 97.74.95.243 port 39118:11: Bye Bye [preauth] Jan 14 13:50:37 host sshd[10163]: Disconnected from 97.74.95.243 port 39118 [preauth] Jan 14 13:50:41 host sshd[10211]: Invalid user jmzhang from 43.134.41.199 port 45864 Jan 14 13:50:41 host sshd[10211]: input_userauth_request: invalid user jmzhang [preauth] Jan 14 13:50:41 host sshd[10211]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:50:41 host sshd[10211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.41.199 Jan 14 13:50:44 host sshd[10211]: Failed password for invalid user jmzhang from 43.134.41.199 port 45864 ssh2 Jan 14 13:50:44 host sshd[10211]: Received disconnect from 43.134.41.199 port 45864:11: Bye Bye [preauth] Jan 14 13:50:44 host sshd[10211]: Disconnected from 43.134.41.199 port 45864 [preauth] Jan 14 13:51:17 host sshd[10270]: Invalid user zzding from 167.172.148.74 port 47248 Jan 14 13:51:17 host sshd[10270]: input_userauth_request: invalid user zzding [preauth] Jan 14 13:51:17 host sshd[10270]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:51:17 host sshd[10270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.148.74 Jan 14 13:51:17 host sshd[10273]: Invalid user bosstt from 5.255.106.239 port 63896 Jan 14 13:51:17 host sshd[10273]: input_userauth_request: invalid user bosstt [preauth] Jan 14 13:51:17 host sshd[10273]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:51:17 host sshd[10273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.106.239 Jan 14 13:51:19 host sshd[10270]: Failed password for invalid user zzding from 167.172.148.74 port 47248 ssh2 Jan 14 13:51:19 host sshd[10270]: Received disconnect from 167.172.148.74 port 47248:11: Bye Bye [preauth] Jan 14 13:51:19 host sshd[10270]: Disconnected from 167.172.148.74 port 47248 [preauth] Jan 14 13:51:20 host sshd[10273]: Failed password for invalid user bosstt from 5.255.106.239 port 63896 ssh2 Jan 14 13:51:20 host sshd[10273]: Received disconnect from 5.255.106.239 port 63896:11: Bye Bye [preauth] Jan 14 13:51:20 host sshd[10273]: Disconnected from 5.255.106.239 port 63896 [preauth] Jan 14 13:51:46 host sshd[10362]: User root from 203.80.23.197 not allowed because not listed in AllowUsers Jan 14 13:51:46 host sshd[10362]: input_userauth_request: invalid user root [preauth] Jan 14 13:51:46 host unix_chkpwd[10366]: password check failed for user (root) Jan 14 13:51:46 host sshd[10362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.80.23.197 user=root Jan 14 13:51:46 host sshd[10362]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:51:48 host sshd[10369]: Invalid user qibinlou from 197.153.57.103 port 41316 Jan 14 13:51:48 host sshd[10369]: input_userauth_request: invalid user qibinlou [preauth] Jan 14 13:51:48 host sshd[10369]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:51:48 host sshd[10369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.153.57.103 Jan 14 13:51:49 host sshd[10362]: Failed password for invalid user root from 203.80.23.197 port 42518 ssh2 Jan 14 13:51:49 host sshd[10362]: Received disconnect from 203.80.23.197 port 42518:11: Bye Bye [preauth] Jan 14 13:51:49 host sshd[10362]: Disconnected from 203.80.23.197 port 42518 [preauth] Jan 14 13:51:49 host sshd[10369]: Failed password for invalid user qibinlou from 197.153.57.103 port 41316 ssh2 Jan 14 13:51:50 host sshd[10369]: Received disconnect from 197.153.57.103 port 41316:11: Bye Bye [preauth] Jan 14 13:51:50 host sshd[10369]: Disconnected from 197.153.57.103 port 41316 [preauth] Jan 14 13:52:24 host sshd[10456]: User root from 167.172.148.74 not allowed because not listed in AllowUsers Jan 14 13:52:24 host sshd[10456]: input_userauth_request: invalid user root [preauth] Jan 14 13:52:24 host unix_chkpwd[10459]: password check failed for user (root) Jan 14 13:52:24 host sshd[10456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.148.74 user=root Jan 14 13:52:24 host sshd[10456]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:52:25 host sshd[10456]: Failed password for invalid user root from 167.172.148.74 port 51836 ssh2 Jan 14 13:52:26 host sshd[10456]: Received disconnect from 167.172.148.74 port 51836:11: Bye Bye [preauth] Jan 14 13:52:26 host sshd[10456]: Disconnected from 167.172.148.74 port 51836 [preauth] Jan 14 13:52:35 host sshd[10526]: User root from 143.110.168.248 not allowed because not listed in AllowUsers Jan 14 13:52:35 host sshd[10526]: input_userauth_request: invalid user root [preauth] Jan 14 13:52:35 host unix_chkpwd[10529]: password check failed for user (root) Jan 14 13:52:35 host sshd[10526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.168.248 user=root Jan 14 13:52:35 host sshd[10526]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:52:37 host sshd[10526]: Failed password for invalid user root from 143.110.168.248 port 40918 ssh2 Jan 14 13:52:37 host sshd[10526]: Received disconnect from 143.110.168.248 port 40918:11: Bye Bye [preauth] Jan 14 13:52:37 host sshd[10526]: Disconnected from 143.110.168.248 port 40918 [preauth] Jan 14 13:52:40 host sshd[10535]: User root from 134.17.16.40 not allowed because not listed in AllowUsers Jan 14 13:52:40 host sshd[10535]: input_userauth_request: invalid user root [preauth] Jan 14 13:52:40 host unix_chkpwd[10538]: password check failed for user (root) Jan 14 13:52:40 host sshd[10535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 user=root Jan 14 13:52:40 host sshd[10535]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:52:42 host sshd[10535]: Failed password for invalid user root from 134.17.16.40 port 39632 ssh2 Jan 14 13:52:42 host sshd[10535]: Received disconnect from 134.17.16.40 port 39632:11: Bye Bye [preauth] Jan 14 13:52:42 host sshd[10535]: Disconnected from 134.17.16.40 port 39632 [preauth] Jan 14 13:52:51 host sshd[10610]: Invalid user chaochin from 97.74.95.243 port 43380 Jan 14 13:52:51 host sshd[10610]: input_userauth_request: invalid user chaochin [preauth] Jan 14 13:52:51 host sshd[10610]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:52:51 host sshd[10610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.95.243 Jan 14 13:52:53 host sshd[10610]: Failed password for invalid user chaochin from 97.74.95.243 port 43380 ssh2 Jan 14 13:52:53 host sshd[10610]: Received disconnect from 97.74.95.243 port 43380:11: Bye Bye [preauth] Jan 14 13:52:53 host sshd[10610]: Disconnected from 97.74.95.243 port 43380 [preauth] Jan 14 13:52:56 host sshd[10615]: User root from 186.10.245.152 not allowed because not listed in AllowUsers Jan 14 13:52:56 host sshd[10615]: input_userauth_request: invalid user root [preauth] Jan 14 13:52:56 host unix_chkpwd[10619]: password check failed for user (root) Jan 14 13:52:56 host sshd[10615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.245.152 user=root Jan 14 13:52:56 host sshd[10615]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:52:58 host sshd[10615]: Failed password for invalid user root from 186.10.245.152 port 55894 ssh2 Jan 14 13:52:58 host sshd[10615]: Received disconnect from 186.10.245.152 port 55894:11: Bye Bye [preauth] Jan 14 13:52:58 host sshd[10615]: Disconnected from 186.10.245.152 port 55894 [preauth] Jan 14 13:53:01 host sshd[10624]: Invalid user zzding from 197.153.57.103 port 54737 Jan 14 13:53:01 host sshd[10624]: input_userauth_request: invalid user zzding [preauth] Jan 14 13:53:01 host sshd[10624]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:53:01 host sshd[10624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.153.57.103 Jan 14 13:53:03 host sshd[10624]: Failed password for invalid user zzding from 197.153.57.103 port 54737 ssh2 Jan 14 13:53:11 host sshd[10719]: Invalid user bad from 43.134.41.199 port 50988 Jan 14 13:53:11 host sshd[10719]: input_userauth_request: invalid user bad [preauth] Jan 14 13:53:11 host sshd[10719]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:53:11 host sshd[10719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.41.199 Jan 14 13:53:13 host sshd[10719]: Failed password for invalid user bad from 43.134.41.199 port 50988 ssh2 Jan 14 13:53:14 host sshd[10719]: Received disconnect from 43.134.41.199 port 50988:11: Bye Bye [preauth] Jan 14 13:53:14 host sshd[10719]: Disconnected from 43.134.41.199 port 50988 [preauth] Jan 14 13:54:16 host sshd[10838]: Invalid user wanweitao from 80.68.3.98 port 49760 Jan 14 13:54:16 host sshd[10838]: input_userauth_request: invalid user wanweitao [preauth] Jan 14 13:54:16 host sshd[10838]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:54:16 host sshd[10838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.3.98 Jan 14 13:54:17 host sshd[10842]: Invalid user webapp from 97.74.95.243 port 42010 Jan 14 13:54:17 host sshd[10842]: input_userauth_request: invalid user webapp [preauth] Jan 14 13:54:17 host sshd[10842]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:54:17 host sshd[10842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.95.243 Jan 14 13:54:18 host sshd[10838]: Failed password for invalid user wanweitao from 80.68.3.98 port 49760 ssh2 Jan 14 13:54:18 host sshd[10838]: Received disconnect from 80.68.3.98 port 49760:11: Bye Bye [preauth] Jan 14 13:54:18 host sshd[10838]: Disconnected from 80.68.3.98 port 49760 [preauth] Jan 14 13:54:19 host sshd[10842]: Failed password for invalid user webapp from 97.74.95.243 port 42010 ssh2 Jan 14 13:54:37 host sshd[10918]: User root from 43.134.41.199 not allowed because not listed in AllowUsers Jan 14 13:54:37 host sshd[10918]: input_userauth_request: invalid user root [preauth] Jan 14 13:54:37 host unix_chkpwd[10920]: password check failed for user (root) Jan 14 13:54:37 host sshd[10918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.41.199 user=root Jan 14 13:54:37 host sshd[10918]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:54:39 host sshd[10918]: Failed password for invalid user root from 43.134.41.199 port 50082 ssh2 Jan 14 13:54:39 host sshd[10918]: Received disconnect from 43.134.41.199 port 50082:11: Bye Bye [preauth] Jan 14 13:54:39 host sshd[10918]: Disconnected from 43.134.41.199 port 50082 [preauth] Jan 14 13:55:23 host sshd[11015]: User root from 206.189.192.163 not allowed because not listed in AllowUsers Jan 14 13:55:23 host sshd[11015]: input_userauth_request: invalid user root [preauth] Jan 14 13:55:23 host unix_chkpwd[11018]: password check failed for user (root) Jan 14 13:55:23 host sshd[11015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.192.163 user=root Jan 14 13:55:23 host sshd[11015]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:55:25 host sshd[11015]: Failed password for invalid user root from 206.189.192.163 port 38308 ssh2 Jan 14 13:55:25 host sshd[11015]: Received disconnect from 206.189.192.163 port 38308:11: Bye Bye [preauth] Jan 14 13:55:25 host sshd[11015]: Disconnected from 206.189.192.163 port 38308 [preauth] Jan 14 13:55:33 host sshd[11047]: User root from 207.249.96.164 not allowed because not listed in AllowUsers Jan 14 13:55:33 host sshd[11047]: input_userauth_request: invalid user root [preauth] Jan 14 13:55:33 host unix_chkpwd[11061]: password check failed for user (root) Jan 14 13:55:33 host sshd[11047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.164 user=root Jan 14 13:55:33 host sshd[11047]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:55:35 host sshd[11047]: Failed password for invalid user root from 207.249.96.164 port 45448 ssh2 Jan 14 13:55:35 host sshd[11047]: Received disconnect from 207.249.96.164 port 45448:11: Bye Bye [preauth] Jan 14 13:55:35 host sshd[11047]: Disconnected from 207.249.96.164 port 45448 [preauth] Jan 14 13:55:35 host sshd[11063]: Invalid user xjx from 202.169.46.155 port 36384 Jan 14 13:55:35 host sshd[11063]: input_userauth_request: invalid user xjx [preauth] Jan 14 13:55:35 host sshd[11063]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:55:35 host sshd[11063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.155 Jan 14 13:55:37 host sshd[11063]: Failed password for invalid user xjx from 202.169.46.155 port 36384 ssh2 Jan 14 13:55:38 host sshd[11063]: Received disconnect from 202.169.46.155 port 36384:11: Bye Bye [preauth] Jan 14 13:55:38 host sshd[11063]: Disconnected from 202.169.46.155 port 36384 [preauth] Jan 14 13:56:18 host sshd[11115]: Invalid user lianghe from 206.189.126.211 port 45254 Jan 14 13:56:18 host sshd[11115]: input_userauth_request: invalid user lianghe [preauth] Jan 14 13:56:18 host sshd[11115]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:56:18 host sshd[11115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.126.211 Jan 14 13:56:20 host sshd[11115]: Failed password for invalid user lianghe from 206.189.126.211 port 45254 ssh2 Jan 14 13:56:20 host sshd[11115]: Received disconnect from 206.189.126.211 port 45254:11: Bye Bye [preauth] Jan 14 13:56:20 host sshd[11115]: Disconnected from 206.189.126.211 port 45254 [preauth] Jan 14 13:56:53 host sshd[11172]: User root from 5.255.106.239 not allowed because not listed in AllowUsers Jan 14 13:56:53 host sshd[11172]: input_userauth_request: invalid user root [preauth] Jan 14 13:56:53 host unix_chkpwd[11176]: password check failed for user (root) Jan 14 13:56:53 host sshd[11172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.106.239 user=root Jan 14 13:56:53 host sshd[11172]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:56:55 host sshd[11172]: Failed password for invalid user root from 5.255.106.239 port 5338 ssh2 Jan 14 13:56:55 host sshd[11172]: Received disconnect from 5.255.106.239 port 5338:11: Bye Bye [preauth] Jan 14 13:56:55 host sshd[11172]: Disconnected from 5.255.106.239 port 5338 [preauth] Jan 14 13:57:17 host sshd[11345]: Invalid user remote from 142.44.247.187 port 51082 Jan 14 13:57:17 host sshd[11345]: input_userauth_request: invalid user remote [preauth] Jan 14 13:57:17 host sshd[11345]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:57:17 host sshd[11345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.247.187 Jan 14 13:57:19 host sshd[11345]: Failed password for invalid user remote from 142.44.247.187 port 51082 ssh2 Jan 14 13:57:19 host sshd[11345]: Received disconnect from 142.44.247.187 port 51082:11: Bye Bye [preauth] Jan 14 13:57:19 host sshd[11345]: Disconnected from 142.44.247.187 port 51082 [preauth] Jan 14 13:57:32 host sshd[11380]: Invalid user apache from 206.189.126.211 port 52016 Jan 14 13:57:32 host sshd[11380]: input_userauth_request: invalid user apache [preauth] Jan 14 13:57:32 host sshd[11380]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:57:32 host sshd[11380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.126.211 Jan 14 13:57:34 host sshd[11380]: Failed password for invalid user apache from 206.189.126.211 port 52016 ssh2 Jan 14 13:57:34 host sshd[11380]: Received disconnect from 206.189.126.211 port 52016:11: Bye Bye [preauth] Jan 14 13:57:34 host sshd[11380]: Disconnected from 206.189.126.211 port 52016 [preauth] Jan 14 13:57:47 host sshd[11403]: Invalid user caoke from 206.189.192.163 port 52638 Jan 14 13:57:47 host sshd[11403]: input_userauth_request: invalid user caoke [preauth] Jan 14 13:57:47 host sshd[11403]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:57:47 host sshd[11403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.192.163 Jan 14 13:57:50 host sshd[11403]: Failed password for invalid user caoke from 206.189.192.163 port 52638 ssh2 Jan 14 13:57:50 host sshd[11403]: Received disconnect from 206.189.192.163 port 52638:11: Bye Bye [preauth] Jan 14 13:57:50 host sshd[11403]: Disconnected from 206.189.192.163 port 52638 [preauth] Jan 14 13:57:56 host sshd[11448]: Invalid user sysop from 203.80.23.197 port 42950 Jan 14 13:57:56 host sshd[11448]: input_userauth_request: invalid user sysop [preauth] Jan 14 13:57:56 host sshd[11448]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:57:56 host sshd[11448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.80.23.197 Jan 14 13:57:57 host sshd[11448]: Failed password for invalid user sysop from 203.80.23.197 port 42950 ssh2 Jan 14 13:57:58 host sshd[11448]: Received disconnect from 203.80.23.197 port 42950:11: Bye Bye [preauth] Jan 14 13:57:58 host sshd[11448]: Disconnected from 203.80.23.197 port 42950 [preauth] Jan 14 13:58:22 host sshd[11537]: User root from 202.169.46.155 not allowed because not listed in AllowUsers Jan 14 13:58:22 host sshd[11537]: input_userauth_request: invalid user root [preauth] Jan 14 13:58:22 host unix_chkpwd[11540]: password check failed for user (root) Jan 14 13:58:22 host sshd[11537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.155 user=root Jan 14 13:58:22 host sshd[11537]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:58:24 host sshd[11537]: Failed password for invalid user root from 202.169.46.155 port 48604 ssh2 Jan 14 13:58:24 host sshd[11537]: Received disconnect from 202.169.46.155 port 48604:11: Bye Bye [preauth] Jan 14 13:58:24 host sshd[11537]: Disconnected from 202.169.46.155 port 48604 [preauth] Jan 14 13:58:42 host sshd[11634]: User root from 206.189.126.211 not allowed because not listed in AllowUsers Jan 14 13:58:42 host sshd[11634]: input_userauth_request: invalid user root [preauth] Jan 14 13:58:42 host unix_chkpwd[11645]: password check failed for user (root) Jan 14 13:58:42 host sshd[11634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.126.211 user=root Jan 14 13:58:42 host sshd[11634]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:58:44 host sshd[11634]: Failed password for invalid user root from 206.189.126.211 port 58348 ssh2 Jan 14 13:58:47 host sshd[11681]: Invalid user tmux from 142.44.247.187 port 48032 Jan 14 13:58:47 host sshd[11681]: input_userauth_request: invalid user tmux [preauth] Jan 14 13:58:47 host sshd[11681]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:58:47 host sshd[11681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.247.187 Jan 14 13:58:49 host sshd[11681]: Failed password for invalid user tmux from 142.44.247.187 port 48032 ssh2 Jan 14 13:58:49 host sshd[11681]: Received disconnect from 142.44.247.187 port 48032:11: Bye Bye [preauth] Jan 14 13:58:49 host sshd[11681]: Disconnected from 142.44.247.187 port 48032 [preauth] Jan 14 13:58:51 host sshd[11690]: Invalid user cxy from 207.249.96.164 port 52496 Jan 14 13:58:51 host sshd[11690]: input_userauth_request: invalid user cxy [preauth] Jan 14 13:58:51 host sshd[11690]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:58:51 host sshd[11690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.164 Jan 14 13:58:53 host sshd[11690]: Failed password for invalid user cxy from 207.249.96.164 port 52496 ssh2 Jan 14 13:58:53 host sshd[11690]: Received disconnect from 207.249.96.164 port 52496:11: Bye Bye [preauth] Jan 14 13:58:53 host sshd[11690]: Disconnected from 207.249.96.164 port 52496 [preauth] Jan 14 13:58:57 host sshd[11701]: Invalid user weihu from 80.68.3.98 port 42507 Jan 14 13:58:57 host sshd[11701]: input_userauth_request: invalid user weihu [preauth] Jan 14 13:58:57 host sshd[11701]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:58:57 host sshd[11701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.3.98 Jan 14 13:59:00 host sshd[11701]: Failed password for invalid user weihu from 80.68.3.98 port 42507 ssh2 Jan 14 13:59:00 host sshd[11701]: Received disconnect from 80.68.3.98 port 42507:11: Bye Bye [preauth] Jan 14 13:59:00 host sshd[11701]: Disconnected from 80.68.3.98 port 42507 [preauth] Jan 14 13:59:10 host sshd[11756]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 14 13:59:10 host sshd[11756]: input_userauth_request: invalid user root [preauth] Jan 14 13:59:10 host unix_chkpwd[11760]: password check failed for user (root) Jan 14 13:59:10 host sshd[11756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 14 13:59:10 host sshd[11756]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 13:59:12 host sshd[11756]: Failed password for invalid user root from 194.169.175.102 port 59565 ssh2 Jan 14 13:59:13 host sshd[11756]: Received disconnect from 194.169.175.102 port 59565:11: Client disconnecting normally [preauth] Jan 14 13:59:13 host sshd[11756]: Disconnected from 194.169.175.102 port 59565 [preauth] Jan 14 13:59:51 host sshd[11834]: Invalid user xbox from 142.44.247.187 port 42552 Jan 14 13:59:51 host sshd[11834]: input_userauth_request: invalid user xbox [preauth] Jan 14 13:59:51 host sshd[11834]: pam_unix(sshd:auth): check pass; user unknown Jan 14 13:59:51 host sshd[11834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.247.187 Jan 14 13:59:52 host sshd[11834]: Failed password for invalid user xbox from 142.44.247.187 port 42552 ssh2 Jan 14 14:00:16 host sshd[11923]: User root from 80.68.3.98 not allowed because not listed in AllowUsers Jan 14 14:00:16 host sshd[11923]: input_userauth_request: invalid user root [preauth] Jan 14 14:00:16 host unix_chkpwd[11926]: password check failed for user (root) Jan 14 14:00:16 host sshd[11923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.3.98 user=root Jan 14 14:00:16 host sshd[11923]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 14:00:17 host sshd[11923]: Failed password for invalid user root from 80.68.3.98 port 53378 ssh2 Jan 14 14:00:17 host sshd[11923]: Received disconnect from 80.68.3.98 port 53378:11: Bye Bye [preauth] Jan 14 14:00:17 host sshd[11923]: Disconnected from 80.68.3.98 port 53378 [preauth] Jan 14 14:09:33 host sshd[13188]: Invalid user postgres from 59.24.194.71 port 62095 Jan 14 14:09:33 host sshd[13188]: input_userauth_request: invalid user postgres [preauth] Jan 14 14:09:33 host sshd[13188]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:09:33 host sshd[13188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.194.71 Jan 14 14:09:36 host sshd[13188]: Failed password for invalid user postgres from 59.24.194.71 port 62095 ssh2 Jan 14 14:09:37 host sshd[13188]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:09:39 host sshd[13188]: Failed password for invalid user postgres from 59.24.194.71 port 62095 ssh2 Jan 14 14:09:40 host sshd[13188]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:09:43 host sshd[13188]: Failed password for invalid user postgres from 59.24.194.71 port 62095 ssh2 Jan 14 14:09:44 host sshd[13188]: Failed password for invalid user postgres from 59.24.194.71 port 62095 ssh2 Jan 14 14:09:44 host sshd[13188]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:09:46 host sshd[13188]: Failed password for invalid user postgres from 59.24.194.71 port 62095 ssh2 Jan 14 14:09:47 host sshd[13188]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:09:49 host sshd[13188]: Failed password for invalid user postgres from 59.24.194.71 port 62095 ssh2 Jan 14 14:09:49 host sshd[13188]: error: maximum authentication attempts exceeded for invalid user postgres from 59.24.194.71 port 62095 ssh2 [preauth] Jan 14 14:09:49 host sshd[13188]: Disconnecting: Too many authentication failures [preauth] Jan 14 14:09:49 host sshd[13188]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.194.71 Jan 14 14:09:49 host sshd[13188]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 14 14:12:25 host sshd[13508]: Invalid user code87 from 209.141.55.27 port 43274 Jan 14 14:12:25 host sshd[13508]: input_userauth_request: invalid user code87 [preauth] Jan 14 14:12:25 host sshd[13508]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:12:25 host sshd[13508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 Jan 14 14:12:27 host sshd[13508]: Failed password for invalid user code87 from 209.141.55.27 port 43274 ssh2 Jan 14 14:12:28 host sshd[13508]: Received disconnect from 209.141.55.27 port 43274:11: Normal Shutdown, Thank you for playing [preauth] Jan 14 14:12:28 host sshd[13508]: Disconnected from 209.141.55.27 port 43274 [preauth] Jan 14 14:20:26 host sshd[14477]: Invalid user admin from 121.136.50.14 port 61966 Jan 14 14:20:26 host sshd[14477]: input_userauth_request: invalid user admin [preauth] Jan 14 14:20:26 host sshd[14477]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:20:26 host sshd[14477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.136.50.14 Jan 14 14:20:28 host sshd[14477]: Failed password for invalid user admin from 121.136.50.14 port 61966 ssh2 Jan 14 14:20:30 host sshd[14477]: Failed password for invalid user admin from 121.136.50.14 port 61966 ssh2 Jan 14 14:20:30 host sshd[14477]: Connection reset by 121.136.50.14 port 61966 [preauth] Jan 14 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 14:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 14:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 14:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=ugotscom user-8=wwwresourcehunte user-9=keralaholi user-10=wwwrmswll user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=remysagr user-15=disposeat user-16=wwwkmaorg user-17=pmcresources user-18=shalinijames user-19=wwwtestugo user-20=vfmassets user-21=straightcurve user-22=wwwletsstalkfood user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=phmetals user-28=kottayamcalldriv user-29=palco123 user-30=gifterman feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 14:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 14:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sGSGvD9qqydbqUq6.~ Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sGSGvD9qqydbqUq6.~' Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sGSGvD9qqydbqUq6.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 14:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 14:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 14:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 14:22:46 host sshd[15068]: User root from 121.189.163.253 not allowed because not listed in AllowUsers Jan 14 14:22:46 host sshd[15068]: input_userauth_request: invalid user root [preauth] Jan 14 14:22:46 host unix_chkpwd[15072]: password check failed for user (root) Jan 14 14:22:46 host sshd[15068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.189.163.253 user=root Jan 14 14:22:46 host sshd[15068]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 14:22:49 host sshd[15068]: Failed password for invalid user root from 121.189.163.253 port 62931 ssh2 Jan 14 14:22:49 host unix_chkpwd[15086]: password check failed for user (root) Jan 14 14:22:49 host sshd[15068]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 14:22:51 host sshd[15068]: Failed password for invalid user root from 121.189.163.253 port 62931 ssh2 Jan 14 14:22:52 host unix_chkpwd[15090]: password check failed for user (root) Jan 14 14:22:52 host sshd[15068]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 14:22:54 host sshd[15068]: Failed password for invalid user root from 121.189.163.253 port 62931 ssh2 Jan 14 14:22:54 host unix_chkpwd[15094]: password check failed for user (root) Jan 14 14:22:54 host sshd[15068]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 14:22:56 host sshd[15068]: Failed password for invalid user root from 121.189.163.253 port 62931 ssh2 Jan 14 14:22:57 host unix_chkpwd[15097]: password check failed for user (root) Jan 14 14:22:57 host sshd[15068]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 14:22:59 host sshd[15068]: Failed password for invalid user root from 121.189.163.253 port 62931 ssh2 Jan 14 14:23:47 host sshd[15215]: Invalid user ubnt from 59.126.209.228 port 49922 Jan 14 14:23:47 host sshd[15215]: input_userauth_request: invalid user ubnt [preauth] Jan 14 14:23:47 host sshd[15215]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:23:47 host sshd[15215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.209.228 Jan 14 14:23:49 host sshd[15215]: Failed password for invalid user ubnt from 59.126.209.228 port 49922 ssh2 Jan 14 14:23:50 host sshd[15215]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:23:51 host sshd[15215]: Failed password for invalid user ubnt from 59.126.209.228 port 49922 ssh2 Jan 14 14:23:52 host sshd[15215]: Failed password for invalid user ubnt from 59.126.209.228 port 49922 ssh2 Jan 14 14:23:52 host sshd[15215]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:23:54 host sshd[15215]: Failed password for invalid user ubnt from 59.126.209.228 port 49922 ssh2 Jan 14 14:23:55 host sshd[15215]: Connection reset by 59.126.209.228 port 49922 [preauth] Jan 14 14:23:55 host sshd[15215]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.209.228 Jan 14 14:29:13 host sshd[15951]: Did not receive identification string from 58.72.18.130 port 19574 Jan 14 14:41:07 host sshd[17530]: Invalid user chenliang from 15.235.141.21 port 60166 Jan 14 14:41:07 host sshd[17530]: input_userauth_request: invalid user chenliang [preauth] Jan 14 14:41:07 host sshd[17530]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:41:07 host sshd[17530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.235.141.21 Jan 14 14:41:09 host sshd[17530]: Failed password for invalid user chenliang from 15.235.141.21 port 60166 ssh2 Jan 14 14:41:09 host sshd[17530]: Received disconnect from 15.235.141.21 port 60166:11: Bye Bye [preauth] Jan 14 14:41:09 host sshd[17530]: Disconnected from 15.235.141.21 port 60166 [preauth] Jan 14 14:41:11 host sshd[17536]: Invalid user admin from 121.130.111.203 port 63642 Jan 14 14:41:11 host sshd[17536]: input_userauth_request: invalid user admin [preauth] Jan 14 14:41:11 host sshd[17536]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:41:11 host sshd[17536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.111.203 Jan 14 14:41:14 host sshd[17536]: Failed password for invalid user admin from 121.130.111.203 port 63642 ssh2 Jan 14 14:41:14 host sshd[17536]: Connection reset by 121.130.111.203 port 63642 [preauth] Jan 14 14:42:20 host sshd[17636]: Invalid user l3 from 205.185.113.129 port 55520 Jan 14 14:42:20 host sshd[17636]: input_userauth_request: invalid user l3 [preauth] Jan 14 14:42:20 host sshd[17636]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:42:20 host sshd[17636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 14 14:42:22 host sshd[17636]: Failed password for invalid user l3 from 205.185.113.129 port 55520 ssh2 Jan 14 14:42:23 host sshd[17636]: Connection closed by 205.185.113.129 port 55520 [preauth] Jan 14 14:42:54 host sshd[17702]: Invalid user wangdong from 181.28.101.14 port 37950 Jan 14 14:42:54 host sshd[17702]: input_userauth_request: invalid user wangdong [preauth] Jan 14 14:42:54 host sshd[17702]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:42:54 host sshd[17702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.28.101.14 Jan 14 14:42:56 host sshd[17702]: Failed password for invalid user wangdong from 181.28.101.14 port 37950 ssh2 Jan 14 14:42:57 host sshd[17702]: Received disconnect from 181.28.101.14 port 37950:11: Bye Bye [preauth] Jan 14 14:42:57 host sshd[17702]: Disconnected from 181.28.101.14 port 37950 [preauth] Jan 14 14:43:17 host sshd[17764]: Invalid user huangfei from 81.136.100.247 port 36344 Jan 14 14:43:17 host sshd[17764]: input_userauth_request: invalid user huangfei [preauth] Jan 14 14:43:17 host sshd[17764]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:43:17 host sshd[17764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.136.100.247 Jan 14 14:43:19 host sshd[17764]: Failed password for invalid user huangfei from 81.136.100.247 port 36344 ssh2 Jan 14 14:43:20 host sshd[17764]: Received disconnect from 81.136.100.247 port 36344:11: Bye Bye [preauth] Jan 14 14:43:20 host sshd[17764]: Disconnected from 81.136.100.247 port 36344 [preauth] Jan 14 14:43:45 host sshd[17824]: Invalid user hao from 39.91.166.21 port 46646 Jan 14 14:43:45 host sshd[17824]: input_userauth_request: invalid user hao [preauth] Jan 14 14:43:45 host sshd[17824]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:43:45 host sshd[17824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.91.166.21 Jan 14 14:43:46 host sshd[17824]: Failed password for invalid user hao from 39.91.166.21 port 46646 ssh2 Jan 14 14:43:46 host sshd[17824]: Received disconnect from 39.91.166.21 port 46646:11: Bye Bye [preauth] Jan 14 14:43:46 host sshd[17824]: Disconnected from 39.91.166.21 port 46646 [preauth] Jan 14 14:43:47 host sshd[17828]: Invalid user jingzexia from 187.243.248.114 port 33528 Jan 14 14:43:47 host sshd[17828]: input_userauth_request: invalid user jingzexia [preauth] Jan 14 14:43:47 host sshd[17828]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:43:47 host sshd[17828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 Jan 14 14:43:50 host sshd[17828]: Failed password for invalid user jingzexia from 187.243.248.114 port 33528 ssh2 Jan 14 14:43:50 host sshd[17828]: Received disconnect from 187.243.248.114 port 33528:11: Bye Bye [preauth] Jan 14 14:43:50 host sshd[17828]: Disconnected from 187.243.248.114 port 33528 [preauth] Jan 14 14:44:44 host sshd[18062]: Invalid user schuang from 15.235.141.21 port 60324 Jan 14 14:44:44 host sshd[18062]: input_userauth_request: invalid user schuang [preauth] Jan 14 14:44:44 host sshd[18062]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:44:44 host sshd[18062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.235.141.21 Jan 14 14:44:46 host sshd[18062]: Failed password for invalid user schuang from 15.235.141.21 port 60324 ssh2 Jan 14 14:44:46 host sshd[18062]: Received disconnect from 15.235.141.21 port 60324:11: Bye Bye [preauth] Jan 14 14:44:46 host sshd[18062]: Disconnected from 15.235.141.21 port 60324 [preauth] Jan 14 14:46:09 host sshd[18226]: Invalid user user12 from 15.235.141.21 port 60430 Jan 14 14:46:09 host sshd[18226]: input_userauth_request: invalid user user12 [preauth] Jan 14 14:46:09 host sshd[18226]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:46:09 host sshd[18226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.235.141.21 Jan 14 14:46:11 host sshd[18226]: Failed password for invalid user user12 from 15.235.141.21 port 60430 ssh2 Jan 14 14:46:11 host sshd[18226]: Received disconnect from 15.235.141.21 port 60430:11: Bye Bye [preauth] Jan 14 14:46:11 host sshd[18226]: Disconnected from 15.235.141.21 port 60430 [preauth] Jan 14 14:46:30 host sshd[18302]: Invalid user boruifei from 164.92.130.239 port 45828 Jan 14 14:46:30 host sshd[18302]: input_userauth_request: invalid user boruifei [preauth] Jan 14 14:46:30 host sshd[18302]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:46:30 host sshd[18302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.239 Jan 14 14:46:32 host sshd[18302]: Failed password for invalid user boruifei from 164.92.130.239 port 45828 ssh2 Jan 14 14:46:32 host sshd[18302]: Received disconnect from 164.92.130.239 port 45828:11: Bye Bye [preauth] Jan 14 14:46:32 host sshd[18302]: Disconnected from 164.92.130.239 port 45828 [preauth] Jan 14 14:46:43 host sshd[18329]: Invalid user hao from 103.66.206.219 port 41374 Jan 14 14:46:43 host sshd[18329]: input_userauth_request: invalid user hao [preauth] Jan 14 14:46:43 host sshd[18329]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:46:43 host sshd[18329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.206.219 Jan 14 14:46:45 host sshd[18329]: Failed password for invalid user hao from 103.66.206.219 port 41374 ssh2 Jan 14 14:46:45 host sshd[18329]: Received disconnect from 103.66.206.219 port 41374:11: Bye Bye [preauth] Jan 14 14:46:45 host sshd[18329]: Disconnected from 103.66.206.219 port 41374 [preauth] Jan 14 14:47:08 host sshd[18369]: Invalid user user1 from 115.79.115.145 port 45388 Jan 14 14:47:08 host sshd[18369]: input_userauth_request: invalid user user1 [preauth] Jan 14 14:47:08 host sshd[18369]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:47:08 host sshd[18369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.115.145 Jan 14 14:47:09 host sshd[18372]: Invalid user huangfei from 106.250.187.83 port 18992 Jan 14 14:47:09 host sshd[18372]: input_userauth_request: invalid user huangfei [preauth] Jan 14 14:47:09 host sshd[18372]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:47:09 host sshd[18372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.250.187.83 Jan 14 14:47:10 host sshd[18369]: Failed password for invalid user user1 from 115.79.115.145 port 45388 ssh2 Jan 14 14:47:10 host sshd[18369]: Received disconnect from 115.79.115.145 port 45388:11: Bye Bye [preauth] Jan 14 14:47:10 host sshd[18369]: Disconnected from 115.79.115.145 port 45388 [preauth] Jan 14 14:47:11 host sshd[18372]: Failed password for invalid user huangfei from 106.250.187.83 port 18992 ssh2 Jan 14 14:47:11 host sshd[18372]: Received disconnect from 106.250.187.83 port 18992:11: Bye Bye [preauth] Jan 14 14:47:11 host sshd[18372]: Disconnected from 106.250.187.83 port 18992 [preauth] Jan 14 14:48:47 host sshd[18527]: Invalid user treichel from 81.136.100.247 port 49838 Jan 14 14:48:47 host sshd[18527]: input_userauth_request: invalid user treichel [preauth] Jan 14 14:48:47 host sshd[18527]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:48:47 host sshd[18527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.136.100.247 Jan 14 14:48:49 host sshd[18527]: Failed password for invalid user treichel from 81.136.100.247 port 49838 ssh2 Jan 14 14:48:49 host sshd[18527]: Received disconnect from 81.136.100.247 port 49838:11: Bye Bye [preauth] Jan 14 14:48:49 host sshd[18527]: Disconnected from 81.136.100.247 port 49838 [preauth] Jan 14 14:48:57 host sshd[18540]: Invalid user wangguifang from 61.99.254.192 port 48722 Jan 14 14:48:57 host sshd[18540]: input_userauth_request: invalid user wangguifang [preauth] Jan 14 14:48:57 host sshd[18540]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:48:57 host sshd[18540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.99.254.192 Jan 14 14:48:59 host sshd[18540]: Failed password for invalid user wangguifang from 61.99.254.192 port 48722 ssh2 Jan 14 14:48:59 host sshd[18540]: Received disconnect from 61.99.254.192 port 48722:11: Bye Bye [preauth] Jan 14 14:48:59 host sshd[18540]: Disconnected from 61.99.254.192 port 48722 [preauth] Jan 14 14:49:13 host sshd[18571]: Invalid user chenmin from 181.28.101.14 port 36780 Jan 14 14:49:13 host sshd[18571]: input_userauth_request: invalid user chenmin [preauth] Jan 14 14:49:13 host sshd[18571]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:49:13 host sshd[18571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.28.101.14 Jan 14 14:49:15 host sshd[18571]: Failed password for invalid user chenmin from 181.28.101.14 port 36780 ssh2 Jan 14 14:49:15 host sshd[18571]: Received disconnect from 181.28.101.14 port 36780:11: Bye Bye [preauth] Jan 14 14:49:15 host sshd[18571]: Disconnected from 181.28.101.14 port 36780 [preauth] Jan 14 14:49:21 host sshd[18587]: Invalid user ubnt from 61.61.18.188 port 50325 Jan 14 14:49:21 host sshd[18587]: input_userauth_request: invalid user ubnt [preauth] Jan 14 14:49:21 host sshd[18587]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:49:21 host sshd[18587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.61.18.188 Jan 14 14:49:23 host sshd[18587]: Failed password for invalid user ubnt from 61.61.18.188 port 50325 ssh2 Jan 14 14:49:24 host sshd[18587]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:49:27 host sshd[18587]: Failed password for invalid user ubnt from 61.61.18.188 port 50325 ssh2 Jan 14 14:49:27 host sshd[18587]: Failed password for invalid user ubnt from 61.61.18.188 port 50325 ssh2 Jan 14 14:49:28 host sshd[18587]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:49:31 host sshd[18587]: Failed password for invalid user ubnt from 61.61.18.188 port 50325 ssh2 Jan 14 14:49:31 host sshd[18587]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:49:33 host sshd[18587]: Failed password for invalid user ubnt from 61.61.18.188 port 50325 ssh2 Jan 14 14:49:34 host sshd[18587]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:49:36 host sshd[18587]: Failed password for invalid user ubnt from 61.61.18.188 port 50325 ssh2 Jan 14 14:49:36 host sshd[18587]: error: maximum authentication attempts exceeded for invalid user ubnt from 61.61.18.188 port 50325 ssh2 [preauth] Jan 14 14:49:36 host sshd[18587]: Disconnecting: Too many authentication failures [preauth] Jan 14 14:49:36 host sshd[18587]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.61.18.188 Jan 14 14:49:36 host sshd[18587]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 14 14:49:47 host sshd[18791]: Invalid user bowen from 187.243.248.114 port 51622 Jan 14 14:49:47 host sshd[18791]: input_userauth_request: invalid user bowen [preauth] Jan 14 14:49:47 host sshd[18791]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:49:47 host sshd[18791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 Jan 14 14:49:50 host sshd[18791]: Failed password for invalid user bowen from 187.243.248.114 port 51622 ssh2 Jan 14 14:49:50 host sshd[18791]: Received disconnect from 187.243.248.114 port 51622:11: Bye Bye [preauth] Jan 14 14:49:50 host sshd[18791]: Disconnected from 187.243.248.114 port 51622 [preauth] Jan 14 14:49:56 host sshd[18807]: Invalid user hao from 81.136.100.247 port 58094 Jan 14 14:49:56 host sshd[18807]: input_userauth_request: invalid user hao [preauth] Jan 14 14:49:56 host sshd[18807]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:49:56 host sshd[18807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.136.100.247 Jan 14 14:49:58 host sshd[18811]: Invalid user yuantinghsieh from 180.180.123.227 port 52633 Jan 14 14:49:58 host sshd[18811]: input_userauth_request: invalid user yuantinghsieh [preauth] Jan 14 14:49:58 host sshd[18811]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:49:58 host sshd[18811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.180.123.227 Jan 14 14:49:58 host sshd[18807]: Failed password for invalid user hao from 81.136.100.247 port 58094 ssh2 Jan 14 14:49:58 host sshd[18807]: Received disconnect from 81.136.100.247 port 58094:11: Bye Bye [preauth] Jan 14 14:49:58 host sshd[18807]: Disconnected from 81.136.100.247 port 58094 [preauth] Jan 14 14:49:59 host sshd[18811]: Failed password for invalid user yuantinghsieh from 180.180.123.227 port 52633 ssh2 Jan 14 14:49:59 host sshd[18811]: Received disconnect from 180.180.123.227 port 52633:11: Bye Bye [preauth] Jan 14 14:49:59 host sshd[18811]: Disconnected from 180.180.123.227 port 52633 [preauth] Jan 14 14:50:05 host sshd[18881]: Invalid user jingzexia from 103.66.206.219 port 38926 Jan 14 14:50:05 host sshd[18881]: input_userauth_request: invalid user jingzexia [preauth] Jan 14 14:50:05 host sshd[18881]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:50:05 host sshd[18881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.206.219 Jan 14 14:50:07 host sshd[18881]: Failed password for invalid user jingzexia from 103.66.206.219 port 38926 ssh2 Jan 14 14:50:07 host sshd[18881]: Received disconnect from 103.66.206.219 port 38926:11: Bye Bye [preauth] Jan 14 14:50:07 host sshd[18881]: Disconnected from 103.66.206.219 port 38926 [preauth] Jan 14 14:50:34 host sshd[18940]: Invalid user bot from 103.133.214.219 port 42740 Jan 14 14:50:34 host sshd[18940]: input_userauth_request: invalid user bot [preauth] Jan 14 14:50:34 host sshd[18940]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:50:34 host sshd[18940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.133.214.219 Jan 14 14:50:36 host sshd[18940]: Failed password for invalid user bot from 103.133.214.219 port 42740 ssh2 Jan 14 14:50:36 host sshd[18940]: Received disconnect from 103.133.214.219 port 42740:11: Normal Shutdown, Thank you for playing [preauth] Jan 14 14:50:36 host sshd[18940]: Disconnected from 103.133.214.219 port 42740 [preauth] Jan 14 14:50:46 host sshd[18967]: Invalid user hogstech from 181.28.101.14 port 58112 Jan 14 14:50:46 host sshd[18967]: input_userauth_request: invalid user hogstech [preauth] Jan 14 14:50:46 host sshd[18967]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:50:46 host sshd[18967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.28.101.14 Jan 14 14:50:48 host sshd[18967]: Failed password for invalid user hogstech from 181.28.101.14 port 58112 ssh2 Jan 14 14:50:48 host sshd[18967]: Received disconnect from 181.28.101.14 port 58112:11: Bye Bye [preauth] Jan 14 14:50:48 host sshd[18967]: Disconnected from 181.28.101.14 port 58112 [preauth] Jan 14 14:51:00 host sshd[19010]: Invalid user xiaobao from 106.250.187.83 port 55824 Jan 14 14:51:00 host sshd[19010]: input_userauth_request: invalid user xiaobao [preauth] Jan 14 14:51:00 host sshd[19010]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:51:00 host sshd[19010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.250.187.83 Jan 14 14:51:03 host sshd[19010]: Failed password for invalid user xiaobao from 106.250.187.83 port 55824 ssh2 Jan 14 14:51:03 host sshd[19010]: Received disconnect from 106.250.187.83 port 55824:11: Bye Bye [preauth] Jan 14 14:51:03 host sshd[19010]: Disconnected from 106.250.187.83 port 55824 [preauth] Jan 14 14:51:35 host sshd[19089]: Invalid user ctlin from 103.66.206.219 port 59926 Jan 14 14:51:35 host sshd[19089]: input_userauth_request: invalid user ctlin [preauth] Jan 14 14:51:35 host sshd[19089]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:51:35 host sshd[19089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.206.219 Jan 14 14:51:37 host sshd[19089]: Failed password for invalid user ctlin from 103.66.206.219 port 59926 ssh2 Jan 14 14:51:37 host sshd[19089]: Received disconnect from 103.66.206.219 port 59926:11: Bye Bye [preauth] Jan 14 14:51:37 host sshd[19089]: Disconnected from 103.66.206.219 port 59926 [preauth] Jan 14 14:51:39 host sshd[19092]: Invalid user xiaoyang from 45.230.167.36 port 56030 Jan 14 14:51:39 host sshd[19092]: input_userauth_request: invalid user xiaoyang [preauth] Jan 14 14:51:39 host sshd[19092]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:51:39 host sshd[19092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.230.167.36 Jan 14 14:51:40 host sshd[19092]: Failed password for invalid user xiaoyang from 45.230.167.36 port 56030 ssh2 Jan 14 14:51:40 host sshd[19092]: Received disconnect from 45.230.167.36 port 56030:11: Bye Bye [preauth] Jan 14 14:51:40 host sshd[19092]: Disconnected from 45.230.167.36 port 56030 [preauth] Jan 14 14:51:46 host sshd[19130]: Invalid user jhehmeyer from 187.243.248.114 port 49562 Jan 14 14:51:46 host sshd[19130]: input_userauth_request: invalid user jhehmeyer [preauth] Jan 14 14:51:46 host sshd[19130]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:51:46 host sshd[19130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 Jan 14 14:51:47 host sshd[19130]: Failed password for invalid user jhehmeyer from 187.243.248.114 port 49562 ssh2 Jan 14 14:51:48 host sshd[19130]: Received disconnect from 187.243.248.114 port 49562:11: Bye Bye [preauth] Jan 14 14:51:48 host sshd[19130]: Disconnected from 187.243.248.114 port 49562 [preauth] Jan 14 14:52:03 host sshd[19193]: Invalid user ctlin from 180.180.123.227 port 38640 Jan 14 14:52:03 host sshd[19193]: input_userauth_request: invalid user ctlin [preauth] Jan 14 14:52:03 host sshd[19193]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:52:03 host sshd[19193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.180.123.227 Jan 14 14:52:04 host sshd[19193]: Failed password for invalid user ctlin from 180.180.123.227 port 38640 ssh2 Jan 14 14:52:04 host sshd[19193]: Received disconnect from 180.180.123.227 port 38640:11: Bye Bye [preauth] Jan 14 14:52:04 host sshd[19193]: Disconnected from 180.180.123.227 port 38640 [preauth] Jan 14 14:52:13 host sshd[19211]: Invalid user jay from 142.93.65.9 port 50854 Jan 14 14:52:13 host sshd[19211]: input_userauth_request: invalid user jay [preauth] Jan 14 14:52:13 host sshd[19211]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:52:13 host sshd[19211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.65.9 Jan 14 14:52:16 host sshd[19211]: Failed password for invalid user jay from 142.93.65.9 port 50854 ssh2 Jan 14 14:52:16 host sshd[19211]: Received disconnect from 142.93.65.9 port 50854:11: Bye Bye [preauth] Jan 14 14:52:16 host sshd[19211]: Disconnected from 142.93.65.9 port 50854 [preauth] Jan 14 14:52:32 host sshd[19259]: Invalid user dhiman from 106.250.187.83 port 22166 Jan 14 14:52:32 host sshd[19259]: input_userauth_request: invalid user dhiman [preauth] Jan 14 14:52:32 host sshd[19259]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:52:32 host sshd[19259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.250.187.83 Jan 14 14:52:33 host sshd[19264]: Invalid user zefeng from 115.79.115.145 port 37416 Jan 14 14:52:33 host sshd[19264]: input_userauth_request: invalid user zefeng [preauth] Jan 14 14:52:33 host sshd[19264]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:52:33 host sshd[19264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.115.145 Jan 14 14:52:34 host sshd[19259]: Failed password for invalid user dhiman from 106.250.187.83 port 22166 ssh2 Jan 14 14:52:34 host sshd[19259]: Received disconnect from 106.250.187.83 port 22166:11: Bye Bye [preauth] Jan 14 14:52:34 host sshd[19259]: Disconnected from 106.250.187.83 port 22166 [preauth] Jan 14 14:52:35 host sshd[19264]: Failed password for invalid user zefeng from 115.79.115.145 port 37416 ssh2 Jan 14 14:52:35 host sshd[19264]: Received disconnect from 115.79.115.145 port 37416:11: Bye Bye [preauth] Jan 14 14:52:35 host sshd[19264]: Disconnected from 115.79.115.145 port 37416 [preauth] Jan 14 14:52:54 host sshd[19323]: Invalid user wangguifang from 164.92.130.239 port 48460 Jan 14 14:52:54 host sshd[19323]: input_userauth_request: invalid user wangguifang [preauth] Jan 14 14:52:54 host sshd[19323]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:52:54 host sshd[19323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.239 Jan 14 14:52:56 host sshd[19323]: Failed password for invalid user wangguifang from 164.92.130.239 port 48460 ssh2 Jan 14 14:52:57 host sshd[19323]: Received disconnect from 164.92.130.239 port 48460:11: Bye Bye [preauth] Jan 14 14:52:57 host sshd[19323]: Disconnected from 164.92.130.239 port 48460 [preauth] Jan 14 14:53:17 host sshd[19361]: Invalid user woaimeinv from 61.99.254.192 port 35994 Jan 14 14:53:17 host sshd[19361]: input_userauth_request: invalid user woaimeinv [preauth] Jan 14 14:53:17 host sshd[19361]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:53:17 host sshd[19361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.99.254.192 Jan 14 14:53:19 host sshd[19361]: Failed password for invalid user woaimeinv from 61.99.254.192 port 35994 ssh2 Jan 14 14:53:20 host sshd[19361]: Received disconnect from 61.99.254.192 port 35994:11: Bye Bye [preauth] Jan 14 14:53:20 host sshd[19361]: Disconnected from 61.99.254.192 port 35994 [preauth] Jan 14 14:53:31 host sshd[19397]: Invalid user zhjin from 142.93.65.9 port 46414 Jan 14 14:53:31 host sshd[19397]: input_userauth_request: invalid user zhjin [preauth] Jan 14 14:53:31 host sshd[19397]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:53:31 host sshd[19397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.65.9 Jan 14 14:53:33 host sshd[19397]: Failed password for invalid user zhjin from 142.93.65.9 port 46414 ssh2 Jan 14 14:53:34 host sshd[19397]: Received disconnect from 142.93.65.9 port 46414:11: Bye Bye [preauth] Jan 14 14:53:34 host sshd[19397]: Disconnected from 142.93.65.9 port 46414 [preauth] Jan 14 14:53:40 host sshd[19413]: Invalid user chenbin from 180.180.123.227 port 51895 Jan 14 14:53:40 host sshd[19413]: input_userauth_request: invalid user chenbin [preauth] Jan 14 14:53:40 host sshd[19413]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:53:40 host sshd[19413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.180.123.227 Jan 14 14:53:42 host sshd[19413]: Failed password for invalid user chenbin from 180.180.123.227 port 51895 ssh2 Jan 14 14:53:42 host sshd[19413]: Received disconnect from 180.180.123.227 port 51895:11: Bye Bye [preauth] Jan 14 14:53:42 host sshd[19413]: Disconnected from 180.180.123.227 port 51895 [preauth] Jan 14 14:54:06 host sshd[19479]: Invalid user physicsmyl from 115.79.115.145 port 49502 Jan 14 14:54:06 host sshd[19479]: input_userauth_request: invalid user physicsmyl [preauth] Jan 14 14:54:06 host sshd[19479]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:54:06 host sshd[19479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.115.145 Jan 14 14:54:08 host sshd[19479]: Failed password for invalid user physicsmyl from 115.79.115.145 port 49502 ssh2 Jan 14 14:54:08 host sshd[19479]: Received disconnect from 115.79.115.145 port 49502:11: Bye Bye [preauth] Jan 14 14:54:08 host sshd[19479]: Disconnected from 115.79.115.145 port 49502 [preauth] Jan 14 14:54:09 host sshd[19484]: Invalid user treichel from 164.92.130.239 port 47104 Jan 14 14:54:09 host sshd[19484]: input_userauth_request: invalid user treichel [preauth] Jan 14 14:54:09 host sshd[19484]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:54:09 host sshd[19484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.130.239 Jan 14 14:54:11 host sshd[19484]: Failed password for invalid user treichel from 164.92.130.239 port 47104 ssh2 Jan 14 14:54:12 host sshd[19484]: Received disconnect from 164.92.130.239 port 47104:11: Bye Bye [preauth] Jan 14 14:54:12 host sshd[19484]: Disconnected from 164.92.130.239 port 47104 [preauth] Jan 14 14:54:34 host sshd[19591]: Invalid user zhanglijuan from 61.99.254.192 port 59346 Jan 14 14:54:34 host sshd[19591]: input_userauth_request: invalid user zhanglijuan [preauth] Jan 14 14:54:34 host sshd[19591]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:54:34 host sshd[19591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.99.254.192 Jan 14 14:54:36 host sshd[19620]: Invalid user jeff from 142.93.65.9 port 40738 Jan 14 14:54:36 host sshd[19620]: input_userauth_request: invalid user jeff [preauth] Jan 14 14:54:36 host sshd[19620]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:54:36 host sshd[19620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.65.9 Jan 14 14:54:36 host sshd[19591]: Failed password for invalid user zhanglijuan from 61.99.254.192 port 59346 ssh2 Jan 14 14:54:38 host sshd[19620]: Failed password for invalid user jeff from 142.93.65.9 port 40738 ssh2 Jan 14 14:54:38 host sshd[19620]: Received disconnect from 142.93.65.9 port 40738:11: Bye Bye [preauth] Jan 14 14:54:38 host sshd[19620]: Disconnected from 142.93.65.9 port 40738 [preauth] Jan 14 14:54:53 host sshd[19780]: Invalid user mzvyagin from 45.230.167.36 port 35964 Jan 14 14:54:53 host sshd[19780]: input_userauth_request: invalid user mzvyagin [preauth] Jan 14 14:54:53 host sshd[19780]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:54:53 host sshd[19780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.230.167.36 Jan 14 14:54:56 host sshd[19780]: Failed password for invalid user mzvyagin from 45.230.167.36 port 35964 ssh2 Jan 14 14:54:56 host sshd[19780]: Received disconnect from 45.230.167.36 port 35964:11: Bye Bye [preauth] Jan 14 14:54:56 host sshd[19780]: Disconnected from 45.230.167.36 port 35964 [preauth] Jan 14 14:55:39 host sshd[19893]: Invalid user hychen from 39.91.166.21 port 42550 Jan 14 14:55:39 host sshd[19893]: input_userauth_request: invalid user hychen [preauth] Jan 14 14:55:39 host sshd[19893]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:55:39 host sshd[19893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.91.166.21 Jan 14 14:55:41 host sshd[19893]: Failed password for invalid user hychen from 39.91.166.21 port 42550 ssh2 Jan 14 14:55:41 host sshd[19893]: Received disconnect from 39.91.166.21 port 42550:11: Bye Bye [preauth] Jan 14 14:55:41 host sshd[19893]: Disconnected from 39.91.166.21 port 42550 [preauth] Jan 14 14:55:57 host sshd[19917]: Invalid user ec2-user from 125.229.45.154 port 54202 Jan 14 14:55:57 host sshd[19917]: input_userauth_request: invalid user ec2-user [preauth] Jan 14 14:55:57 host sshd[19917]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:55:57 host sshd[19917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.45.154 Jan 14 14:55:59 host sshd[19917]: Failed password for invalid user ec2-user from 125.229.45.154 port 54202 ssh2 Jan 14 14:55:59 host sshd[19917]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:56:01 host sshd[19917]: Failed password for invalid user ec2-user from 125.229.45.154 port 54202 ssh2 Jan 14 14:56:02 host sshd[19917]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:56:04 host sshd[19917]: Failed password for invalid user ec2-user from 125.229.45.154 port 54202 ssh2 Jan 14 14:56:04 host sshd[19917]: Connection reset by 125.229.45.154 port 54202 [preauth] Jan 14 14:56:04 host sshd[19917]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.45.154 Jan 14 14:56:32 host sshd[19986]: Invalid user yuantinghsieh from 39.91.166.21 port 53668 Jan 14 14:56:32 host sshd[19986]: input_userauth_request: invalid user yuantinghsieh [preauth] Jan 14 14:56:32 host sshd[19986]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:56:32 host sshd[19986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.91.166.21 Jan 14 14:56:34 host sshd[19986]: Failed password for invalid user yuantinghsieh from 39.91.166.21 port 53668 ssh2 Jan 14 14:56:34 host sshd[19986]: Received disconnect from 39.91.166.21 port 53668:11: Bye Bye [preauth] Jan 14 14:56:34 host sshd[19986]: Disconnected from 39.91.166.21 port 53668 [preauth] Jan 14 14:56:37 host sshd[20026]: Invalid user user1 from 45.230.167.36 port 34972 Jan 14 14:56:37 host sshd[20026]: input_userauth_request: invalid user user1 [preauth] Jan 14 14:56:37 host sshd[20026]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:56:37 host sshd[20026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.230.167.36 Jan 14 14:56:39 host sshd[20026]: Failed password for invalid user user1 from 45.230.167.36 port 34972 ssh2 Jan 14 14:56:40 host sshd[20026]: Received disconnect from 45.230.167.36 port 34972:11: Bye Bye [preauth] Jan 14 14:56:40 host sshd[20026]: Disconnected from 45.230.167.36 port 34972 [preauth] Jan 14 14:57:20 host sshd[20138]: Connection closed by 45.83.64.81 port 1880 [preauth] Jan 14 14:59:44 host sshd[20407]: Invalid user vadmin from 220.135.172.108 port 40390 Jan 14 14:59:44 host sshd[20407]: input_userauth_request: invalid user vadmin [preauth] Jan 14 14:59:44 host sshd[20407]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:59:44 host sshd[20407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.172.108 Jan 14 14:59:46 host sshd[20407]: Failed password for invalid user vadmin from 220.135.172.108 port 40390 ssh2 Jan 14 14:59:47 host sshd[20407]: pam_unix(sshd:auth): check pass; user unknown Jan 14 14:59:49 host sshd[20407]: Failed password for invalid user vadmin from 220.135.172.108 port 40390 ssh2 Jan 14 14:59:50 host sshd[20407]: Connection closed by 220.135.172.108 port 40390 [preauth] Jan 14 14:59:50 host sshd[20407]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.172.108 Jan 14 15:01:12 host sshd[20572]: Connection closed by 36.230.134.171 port 39813 [preauth] Jan 14 15:03:07 host sshd[20860]: Connection closed by 167.94.146.57 port 33062 [preauth] Jan 14 15:05:58 host sshd[21289]: Invalid user admin from 59.15.112.180 port 44748 Jan 14 15:05:58 host sshd[21289]: input_userauth_request: invalid user admin [preauth] Jan 14 15:05:58 host sshd[21289]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:05:58 host sshd[21289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.15.112.180 Jan 14 15:06:01 host sshd[21289]: Failed password for invalid user admin from 59.15.112.180 port 44748 ssh2 Jan 14 15:06:01 host sshd[21289]: Failed password for invalid user admin from 59.15.112.180 port 44748 ssh2 Jan 14 15:06:02 host sshd[21289]: Connection reset by 59.15.112.180 port 44748 [preauth] Jan 14 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 15:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=phmetals user-19=kottayamcalldriv user-20=palco123 user-21=gifterman user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=shalinijames user-29=wwwtestugo user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 15:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 15:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jviksPYt7uByOzqn.~ Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jviksPYt7uByOzqn.~' Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jviksPYt7uByOzqn.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 15:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 15:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 15:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 15:28:11 host sshd[24507]: Invalid user setsunil from 185.90.176.123 port 52482 Jan 14 15:28:11 host sshd[24507]: input_userauth_request: invalid user setsunil [preauth] Jan 14 15:28:11 host sshd[24507]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:28:11 host sshd[24507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.90.176.123 Jan 14 15:28:13 host sshd[24507]: Failed password for invalid user setsunil from 185.90.176.123 port 52482 ssh2 Jan 14 15:28:13 host sshd[24507]: Received disconnect from 185.90.176.123 port 52482:11: Bye Bye [preauth] Jan 14 15:28:13 host sshd[24507]: Disconnected from 185.90.176.123 port 52482 [preauth] Jan 14 15:30:20 host sshd[24766]: Invalid user dz from 194.110.203.109 port 55574 Jan 14 15:30:20 host sshd[24766]: input_userauth_request: invalid user dz [preauth] Jan 14 15:30:20 host sshd[24766]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:30:20 host sshd[24766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 15:30:22 host sshd[24766]: Failed password for invalid user dz from 194.110.203.109 port 55574 ssh2 Jan 14 15:30:25 host sshd[24766]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:30:28 host sshd[24766]: Failed password for invalid user dz from 194.110.203.109 port 55574 ssh2 Jan 14 15:30:29 host sshd[24777]: Invalid user xiaoxin from 31.210.211.114 port 51786 Jan 14 15:30:29 host sshd[24777]: input_userauth_request: invalid user xiaoxin [preauth] Jan 14 15:30:29 host sshd[24777]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:30:29 host sshd[24777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.211.114 Jan 14 15:30:31 host sshd[24777]: Failed password for invalid user xiaoxin from 31.210.211.114 port 51786 ssh2 Jan 14 15:30:31 host sshd[24777]: Received disconnect from 31.210.211.114 port 51786:11: Bye Bye [preauth] Jan 14 15:30:31 host sshd[24777]: Disconnected from 31.210.211.114 port 51786 [preauth] Jan 14 15:30:31 host sshd[24766]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:30:33 host sshd[24766]: Failed password for invalid user dz from 194.110.203.109 port 55574 ssh2 Jan 14 15:30:36 host sshd[24766]: Connection closed by 194.110.203.109 port 55574 [preauth] Jan 14 15:30:36 host sshd[24766]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 15:30:42 host sshd[24821]: Invalid user nfroonin from 95.85.124.33 port 49140 Jan 14 15:30:42 host sshd[24821]: input_userauth_request: invalid user nfroonin [preauth] Jan 14 15:30:42 host sshd[24821]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:30:42 host sshd[24821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.124.33 Jan 14 15:30:44 host sshd[24821]: Failed password for invalid user nfroonin from 95.85.124.33 port 49140 ssh2 Jan 14 15:30:45 host sshd[24821]: Received disconnect from 95.85.124.33 port 49140:11: Bye Bye [preauth] Jan 14 15:30:45 host sshd[24821]: Disconnected from 95.85.124.33 port 49140 [preauth] Jan 14 15:31:35 host sshd[24988]: Invalid user shipra from 206.189.137.162 port 48194 Jan 14 15:31:35 host sshd[24988]: input_userauth_request: invalid user shipra [preauth] Jan 14 15:31:35 host sshd[24988]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:31:35 host sshd[24988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.137.162 Jan 14 15:31:37 host sshd[24988]: Failed password for invalid user shipra from 206.189.137.162 port 48194 ssh2 Jan 14 15:31:37 host sshd[24988]: Received disconnect from 206.189.137.162 port 48194:11: Bye Bye [preauth] Jan 14 15:31:37 host sshd[24988]: Disconnected from 206.189.137.162 port 48194 [preauth] Jan 14 15:32:00 host sshd[25048]: Invalid user shuijing from 111.93.200.50 port 47278 Jan 14 15:32:00 host sshd[25048]: input_userauth_request: invalid user shuijing [preauth] Jan 14 15:32:00 host sshd[25048]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:32:00 host sshd[25048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50 Jan 14 15:32:02 host sshd[25048]: Failed password for invalid user shuijing from 111.93.200.50 port 47278 ssh2 Jan 14 15:32:02 host sshd[25048]: Received disconnect from 111.93.200.50 port 47278:11: Bye Bye [preauth] Jan 14 15:32:02 host sshd[25048]: Disconnected from 111.93.200.50 port 47278 [preauth] Jan 14 15:32:32 host sshd[25109]: Invalid user ainideren from 185.90.176.123 port 58948 Jan 14 15:32:32 host sshd[25109]: input_userauth_request: invalid user ainideren [preauth] Jan 14 15:32:32 host sshd[25109]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:32:32 host sshd[25109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.90.176.123 Jan 14 15:32:34 host sshd[25109]: Failed password for invalid user ainideren from 185.90.176.123 port 58948 ssh2 Jan 14 15:32:34 host sshd[25109]: Received disconnect from 185.90.176.123 port 58948:11: Bye Bye [preauth] Jan 14 15:32:34 host sshd[25109]: Disconnected from 185.90.176.123 port 58948 [preauth] Jan 14 15:33:47 host sshd[25232]: Invalid user siangyang from 31.210.211.114 port 44010 Jan 14 15:33:47 host sshd[25232]: input_userauth_request: invalid user siangyang [preauth] Jan 14 15:33:47 host sshd[25232]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:33:47 host sshd[25232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.211.114 Jan 14 15:33:49 host sshd[25240]: User mysql from 185.90.176.123 not allowed because not listed in AllowUsers Jan 14 15:33:49 host sshd[25240]: input_userauth_request: invalid user mysql [preauth] Jan 14 15:33:49 host sshd[25232]: Failed password for invalid user siangyang from 31.210.211.114 port 44010 ssh2 Jan 14 15:33:49 host unix_chkpwd[25242]: password check failed for user (mysql) Jan 14 15:33:49 host sshd[25240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.90.176.123 user=mysql Jan 14 15:33:49 host sshd[25240]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 14 15:33:49 host sshd[25243]: Invalid user lixiaohong from 111.93.200.50 port 33618 Jan 14 15:33:49 host sshd[25243]: input_userauth_request: invalid user lixiaohong [preauth] Jan 14 15:33:49 host sshd[25243]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:33:49 host sshd[25243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50 Jan 14 15:33:49 host sshd[25232]: Received disconnect from 31.210.211.114 port 44010:11: Bye Bye [preauth] Jan 14 15:33:49 host sshd[25232]: Disconnected from 31.210.211.114 port 44010 [preauth] Jan 14 15:33:51 host sshd[25240]: Failed password for invalid user mysql from 185.90.176.123 port 38228 ssh2 Jan 14 15:33:52 host sshd[25243]: Failed password for invalid user lixiaohong from 111.93.200.50 port 33618 ssh2 Jan 14 15:33:52 host sshd[25243]: Received disconnect from 111.93.200.50 port 33618:11: Bye Bye [preauth] Jan 14 15:33:52 host sshd[25243]: Disconnected from 111.93.200.50 port 33618 [preauth] Jan 14 15:34:57 host sshd[25392]: Invalid user jiangjinbao from 31.210.211.114 port 38303 Jan 14 15:34:57 host sshd[25392]: input_userauth_request: invalid user jiangjinbao [preauth] Jan 14 15:34:57 host sshd[25392]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:34:57 host sshd[25392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.211.114 Jan 14 15:34:58 host sshd[25392]: Failed password for invalid user jiangjinbao from 31.210.211.114 port 38303 ssh2 Jan 14 15:34:59 host sshd[25392]: Received disconnect from 31.210.211.114 port 38303:11: Bye Bye [preauth] Jan 14 15:34:59 host sshd[25392]: Disconnected from 31.210.211.114 port 38303 [preauth] Jan 14 15:35:03 host sshd[25465]: Invalid user brunswicker from 206.189.137.162 port 41184 Jan 14 15:35:03 host sshd[25465]: input_userauth_request: invalid user brunswicker [preauth] Jan 14 15:35:03 host sshd[25465]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:35:03 host sshd[25465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.137.162 Jan 14 15:35:05 host sshd[25465]: Failed password for invalid user brunswicker from 206.189.137.162 port 41184 ssh2 Jan 14 15:35:05 host sshd[25465]: Received disconnect from 206.189.137.162 port 41184:11: Bye Bye [preauth] Jan 14 15:35:05 host sshd[25465]: Disconnected from 206.189.137.162 port 41184 [preauth] Jan 14 15:35:07 host sshd[25467]: User root from 49.88.112.60 not allowed because not listed in AllowUsers Jan 14 15:35:07 host sshd[25467]: input_userauth_request: invalid user root [preauth] Jan 14 15:35:07 host unix_chkpwd[25476]: password check failed for user (root) Jan 14 15:35:07 host sshd[25467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60 user=root Jan 14 15:35:07 host sshd[25467]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 15:35:10 host sshd[25467]: Failed password for invalid user root from 49.88.112.60 port 61992 ssh2 Jan 14 15:35:10 host unix_chkpwd[25479]: password check failed for user (root) Jan 14 15:35:10 host sshd[25467]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 15:35:12 host sshd[25467]: Failed password for invalid user root from 49.88.112.60 port 61992 ssh2 Jan 14 15:35:12 host unix_chkpwd[25482]: password check failed for user (root) Jan 14 15:35:12 host sshd[25467]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 15:35:14 host sshd[25467]: Failed password for invalid user root from 49.88.112.60 port 61992 ssh2 Jan 14 15:35:14 host sshd[25467]: Received disconnect from 49.88.112.60 port 61992:11: [preauth] Jan 14 15:35:14 host sshd[25467]: Disconnected from 49.88.112.60 port 61992 [preauth] Jan 14 15:35:14 host sshd[25467]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60 user=root Jan 14 15:35:15 host sshd[25486]: Invalid user woshihaoren from 111.93.200.50 port 47091 Jan 14 15:35:15 host sshd[25486]: input_userauth_request: invalid user woshihaoren [preauth] Jan 14 15:35:15 host sshd[25486]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:35:15 host sshd[25486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50 Jan 14 15:35:17 host sshd[25486]: Failed password for invalid user woshihaoren from 111.93.200.50 port 47091 ssh2 Jan 14 15:35:17 host sshd[25531]: Invalid user rohan from 95.85.124.33 port 38806 Jan 14 15:35:17 host sshd[25531]: input_userauth_request: invalid user rohan [preauth] Jan 14 15:35:17 host sshd[25531]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:35:17 host sshd[25531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.124.33 Jan 14 15:35:20 host sshd[25531]: Failed password for invalid user rohan from 95.85.124.33 port 38806 ssh2 Jan 14 15:35:20 host sshd[25531]: Received disconnect from 95.85.124.33 port 38806:11: Bye Bye [preauth] Jan 14 15:35:20 host sshd[25531]: Disconnected from 95.85.124.33 port 38806 [preauth] Jan 14 15:35:48 host sshd[25620]: Connection reset by 220.134.7.32 port 44495 [preauth] Jan 14 15:36:26 host sshd[25673]: Invalid user kaixin from 206.189.137.162 port 39188 Jan 14 15:36:26 host sshd[25673]: input_userauth_request: invalid user kaixin [preauth] Jan 14 15:36:26 host sshd[25673]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:36:26 host sshd[25673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.137.162 Jan 14 15:36:28 host sshd[25673]: Failed password for invalid user kaixin from 206.189.137.162 port 39188 ssh2 Jan 14 15:36:28 host sshd[25673]: Received disconnect from 206.189.137.162 port 39188:11: Bye Bye [preauth] Jan 14 15:36:28 host sshd[25673]: Disconnected from 206.189.137.162 port 39188 [preauth] Jan 14 15:37:02 host sshd[25863]: Invalid user lihui from 95.85.124.33 port 39186 Jan 14 15:37:02 host sshd[25863]: input_userauth_request: invalid user lihui [preauth] Jan 14 15:37:02 host sshd[25863]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:37:02 host sshd[25863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.124.33 Jan 14 15:37:04 host sshd[25863]: Failed password for invalid user lihui from 95.85.124.33 port 39186 ssh2 Jan 14 15:37:04 host sshd[25863]: Received disconnect from 95.85.124.33 port 39186:11: Bye Bye [preauth] Jan 14 15:37:04 host sshd[25863]: Disconnected from 95.85.124.33 port 39186 [preauth] Jan 14 15:39:52 host sshd[26209]: Invalid user vagrant from 49.49.178.79 port 56050 Jan 14 15:39:52 host sshd[26209]: input_userauth_request: invalid user vagrant [preauth] Jan 14 15:39:52 host sshd[26209]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:39:52 host sshd[26209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.178.79 Jan 14 15:39:54 host sshd[26209]: Failed password for invalid user vagrant from 49.49.178.79 port 56050 ssh2 Jan 14 15:39:54 host sshd[26209]: Connection reset by 49.49.178.79 port 56050 [preauth] Jan 14 15:40:11 host sshd[26265]: Invalid user nginx from 118.41.164.205 port 60524 Jan 14 15:40:11 host sshd[26265]: input_userauth_request: invalid user nginx [preauth] Jan 14 15:40:11 host sshd[26265]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:40:11 host sshd[26265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.164.205 Jan 14 15:40:14 host sshd[26265]: Failed password for invalid user nginx from 118.41.164.205 port 60524 ssh2 Jan 14 15:40:15 host sshd[26265]: Connection reset by 118.41.164.205 port 60524 [preauth] Jan 14 15:43:52 host sshd[26699]: Connection closed by 192.241.220.25 port 39452 [preauth] Jan 14 15:45:00 host sshd[26956]: Connection reset by 121.188.108.109 port 37082 [preauth] Jan 14 15:59:40 host sshd[29249]: Invalid user pinyi from 157.230.234.46 port 49228 Jan 14 15:59:40 host sshd[29249]: input_userauth_request: invalid user pinyi [preauth] Jan 14 15:59:40 host sshd[29249]: pam_unix(sshd:auth): check pass; user unknown Jan 14 15:59:40 host sshd[29249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.234.46 Jan 14 15:59:42 host sshd[29249]: Failed password for invalid user pinyi from 157.230.234.46 port 49228 ssh2 Jan 14 15:59:42 host sshd[29249]: Received disconnect from 157.230.234.46 port 49228:11: Bye Bye [preauth] Jan 14 15:59:42 host sshd[29249]: Disconnected from 157.230.234.46 port 49228 [preauth] Jan 14 16:00:06 host sshd[29351]: Invalid user juanjuan from 43.131.29.54 port 35628 Jan 14 16:00:06 host sshd[29351]: input_userauth_request: invalid user juanjuan [preauth] Jan 14 16:00:06 host sshd[29351]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:00:06 host sshd[29351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.29.54 Jan 14 16:00:08 host sshd[29351]: Failed password for invalid user juanjuan from 43.131.29.54 port 35628 ssh2 Jan 14 16:00:08 host sshd[29351]: Received disconnect from 43.131.29.54 port 35628:11: Bye Bye [preauth] Jan 14 16:00:08 host sshd[29351]: Disconnected from 43.131.29.54 port 35628 [preauth] Jan 14 16:00:08 host sshd[29362]: Invalid user admin from 106.1.175.185 port 58541 Jan 14 16:00:08 host sshd[29362]: input_userauth_request: invalid user admin [preauth] Jan 14 16:00:08 host sshd[29362]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:00:08 host sshd[29362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.1.175.185 Jan 14 16:00:10 host sshd[29362]: Failed password for invalid user admin from 106.1.175.185 port 58541 ssh2 Jan 14 16:00:11 host sshd[29362]: Failed password for invalid user admin from 106.1.175.185 port 58541 ssh2 Jan 14 16:00:11 host sshd[29362]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:00:13 host sshd[29362]: Failed password for invalid user admin from 106.1.175.185 port 58541 ssh2 Jan 14 16:00:13 host sshd[29379]: Invalid user chenmin from 104.236.111.25 port 51322 Jan 14 16:00:13 host sshd[29379]: input_userauth_request: invalid user chenmin [preauth] Jan 14 16:00:13 host sshd[29379]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:00:13 host sshd[29379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.111.25 Jan 14 16:00:14 host sshd[29362]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:00:16 host sshd[29362]: Failed password for invalid user admin from 106.1.175.185 port 58541 ssh2 Jan 14 16:00:16 host sshd[29379]: Failed password for invalid user chenmin from 104.236.111.25 port 51322 ssh2 Jan 14 16:00:16 host sshd[29379]: Received disconnect from 104.236.111.25 port 51322:11: Bye Bye [preauth] Jan 14 16:00:16 host sshd[29379]: Disconnected from 104.236.111.25 port 51322 [preauth] Jan 14 16:00:16 host sshd[29362]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:00:18 host sshd[29362]: Failed password for invalid user admin from 106.1.175.185 port 58541 ssh2 Jan 14 16:00:35 host sshd[29489]: Invalid user jingming from 203.113.167.3 port 52836 Jan 14 16:00:35 host sshd[29489]: input_userauth_request: invalid user jingming [preauth] Jan 14 16:00:35 host sshd[29489]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:00:35 host sshd[29489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.113.167.3 Jan 14 16:00:36 host sshd[29489]: Failed password for invalid user jingming from 203.113.167.3 port 52836 ssh2 Jan 14 16:00:37 host sshd[29489]: Received disconnect from 203.113.167.3 port 52836:11: Bye Bye [preauth] Jan 14 16:00:37 host sshd[29489]: Disconnected from 203.113.167.3 port 52836 [preauth] Jan 14 16:01:53 host sshd[29872]: Invalid user wangling from 159.203.129.103 port 33941 Jan 14 16:01:53 host sshd[29872]: input_userauth_request: invalid user wangling [preauth] Jan 14 16:01:53 host sshd[29872]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:01:53 host sshd[29872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.129.103 Jan 14 16:01:55 host sshd[29872]: Failed password for invalid user wangling from 159.203.129.103 port 33941 ssh2 Jan 14 16:01:55 host sshd[29872]: Received disconnect from 159.203.129.103 port 33941:11: Bye Bye [preauth] Jan 14 16:01:55 host sshd[29872]: Disconnected from 159.203.129.103 port 33941 [preauth] Jan 14 16:03:47 host sshd[30362]: Invalid user user11 from 195.239.97.254 port 57476 Jan 14 16:03:47 host sshd[30362]: input_userauth_request: invalid user user11 [preauth] Jan 14 16:03:47 host sshd[30362]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:03:47 host sshd[30362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.97.254 Jan 14 16:03:49 host sshd[30362]: Failed password for invalid user user11 from 195.239.97.254 port 57476 ssh2 Jan 14 16:03:50 host sshd[30362]: Received disconnect from 195.239.97.254 port 57476:11: Bye Bye [preauth] Jan 14 16:03:50 host sshd[30362]: Disconnected from 195.239.97.254 port 57476 [preauth] Jan 14 16:04:04 host sshd[30435]: Invalid user liangyuwu from 157.230.234.46 port 39688 Jan 14 16:04:04 host sshd[30435]: input_userauth_request: invalid user liangyuwu [preauth] Jan 14 16:04:04 host sshd[30435]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:04:04 host sshd[30435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.234.46 Jan 14 16:04:06 host sshd[30435]: Failed password for invalid user liangyuwu from 157.230.234.46 port 39688 ssh2 Jan 14 16:04:06 host sshd[30435]: Received disconnect from 157.230.234.46 port 39688:11: Bye Bye [preauth] Jan 14 16:04:06 host sshd[30435]: Disconnected from 157.230.234.46 port 39688 [preauth] Jan 14 16:04:07 host sshd[30446]: Invalid user xiaoyao from 104.236.111.25 port 41066 Jan 14 16:04:07 host sshd[30446]: input_userauth_request: invalid user xiaoyao [preauth] Jan 14 16:04:07 host sshd[30446]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:04:07 host sshd[30446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.111.25 Jan 14 16:04:09 host sshd[30446]: Failed password for invalid user xiaoyao from 104.236.111.25 port 41066 ssh2 Jan 14 16:04:09 host sshd[30446]: Received disconnect from 104.236.111.25 port 41066:11: Bye Bye [preauth] Jan 14 16:04:09 host sshd[30446]: Disconnected from 104.236.111.25 port 41066 [preauth] Jan 14 16:04:13 host sshd[30467]: Invalid user roshni from 159.203.129.103 port 51549 Jan 14 16:04:13 host sshd[30467]: input_userauth_request: invalid user roshni [preauth] Jan 14 16:04:13 host sshd[30467]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:04:13 host sshd[30467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.129.103 Jan 14 16:04:14 host sshd[30467]: Failed password for invalid user roshni from 159.203.129.103 port 51549 ssh2 Jan 14 16:04:15 host sshd[30467]: Received disconnect from 159.203.129.103 port 51549:11: Bye Bye [preauth] Jan 14 16:04:15 host sshd[30467]: Disconnected from 159.203.129.103 port 51549 [preauth] Jan 14 16:04:29 host sshd[30538]: Invalid user xiulinhuang from 43.131.29.54 port 51800 Jan 14 16:04:29 host sshd[30538]: input_userauth_request: invalid user xiulinhuang [preauth] Jan 14 16:04:29 host sshd[30538]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:04:29 host sshd[30538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.29.54 Jan 14 16:04:31 host sshd[30538]: Failed password for invalid user xiulinhuang from 43.131.29.54 port 51800 ssh2 Jan 14 16:04:32 host sshd[30538]: Received disconnect from 43.131.29.54 port 51800:11: Bye Bye [preauth] Jan 14 16:04:32 host sshd[30538]: Disconnected from 43.131.29.54 port 51800 [preauth] Jan 14 16:05:13 host sshd[30714]: Invalid user liuchao from 195.239.97.254 port 53076 Jan 14 16:05:13 host sshd[30714]: input_userauth_request: invalid user liuchao [preauth] Jan 14 16:05:13 host sshd[30714]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:05:13 host sshd[30714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.97.254 Jan 14 16:05:15 host sshd[30714]: Failed password for invalid user liuchao from 195.239.97.254 port 53076 ssh2 Jan 14 16:05:15 host sshd[30714]: Received disconnect from 195.239.97.254 port 53076:11: Bye Bye [preauth] Jan 14 16:05:15 host sshd[30714]: Disconnected from 195.239.97.254 port 53076 [preauth] Jan 14 16:05:17 host sshd[30727]: Invalid user chenmin from 203.113.167.3 port 54484 Jan 14 16:05:17 host sshd[30727]: input_userauth_request: invalid user chenmin [preauth] Jan 14 16:05:17 host sshd[30727]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:05:17 host sshd[30727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.113.167.3 Jan 14 16:05:18 host sshd[30732]: Invalid user djiang from 104.236.111.25 port 40158 Jan 14 16:05:18 host sshd[30732]: input_userauth_request: invalid user djiang [preauth] Jan 14 16:05:18 host sshd[30732]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:05:18 host sshd[30732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.111.25 Jan 14 16:05:20 host sshd[30727]: Failed password for invalid user chenmin from 203.113.167.3 port 54484 ssh2 Jan 14 16:05:20 host sshd[30727]: Received disconnect from 203.113.167.3 port 54484:11: Bye Bye [preauth] Jan 14 16:05:20 host sshd[30727]: Disconnected from 203.113.167.3 port 54484 [preauth] Jan 14 16:05:20 host sshd[30740]: Invalid user yangxiuzhen from 157.230.234.46 port 38688 Jan 14 16:05:20 host sshd[30740]: input_userauth_request: invalid user yangxiuzhen [preauth] Jan 14 16:05:20 host sshd[30740]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:05:20 host sshd[30740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.234.46 Jan 14 16:05:21 host sshd[30732]: Failed password for invalid user djiang from 104.236.111.25 port 40158 ssh2 Jan 14 16:05:21 host sshd[30745]: Invalid user zhangna from 159.203.129.103 port 36952 Jan 14 16:05:21 host sshd[30745]: input_userauth_request: invalid user zhangna [preauth] Jan 14 16:05:21 host sshd[30745]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:05:21 host sshd[30745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.129.103 Jan 14 16:05:21 host sshd[30732]: Received disconnect from 104.236.111.25 port 40158:11: Bye Bye [preauth] Jan 14 16:05:21 host sshd[30732]: Disconnected from 104.236.111.25 port 40158 [preauth] Jan 14 16:05:22 host sshd[30740]: Failed password for invalid user yangxiuzhen from 157.230.234.46 port 38688 ssh2 Jan 14 16:05:22 host sshd[30740]: Received disconnect from 157.230.234.46 port 38688:11: Bye Bye [preauth] Jan 14 16:05:22 host sshd[30740]: Disconnected from 157.230.234.46 port 38688 [preauth] Jan 14 16:05:23 host sshd[30745]: Failed password for invalid user zhangna from 159.203.129.103 port 36952 ssh2 Jan 14 16:05:34 host sshd[30897]: Invalid user hongxing from 43.131.29.54 port 46058 Jan 14 16:05:34 host sshd[30897]: input_userauth_request: invalid user hongxing [preauth] Jan 14 16:05:34 host sshd[30897]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:05:34 host sshd[30897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.29.54 Jan 14 16:05:36 host sshd[30897]: Failed password for invalid user hongxing from 43.131.29.54 port 46058 ssh2 Jan 14 16:05:36 host sshd[30897]: Received disconnect from 43.131.29.54 port 46058:11: Bye Bye [preauth] Jan 14 16:05:36 host sshd[30897]: Disconnected from 43.131.29.54 port 46058 [preauth] Jan 14 16:06:36 host sshd[31265]: Invalid user wodemima from 195.239.97.254 port 47890 Jan 14 16:06:36 host sshd[31265]: input_userauth_request: invalid user wodemima [preauth] Jan 14 16:06:36 host sshd[31265]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:06:36 host sshd[31265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.97.254 Jan 14 16:06:38 host sshd[31265]: Failed password for invalid user wodemima from 195.239.97.254 port 47890 ssh2 Jan 14 16:06:56 host sshd[31354]: Invalid user xuhou from 203.113.167.3 port 56118 Jan 14 16:06:56 host sshd[31354]: input_userauth_request: invalid user xuhou [preauth] Jan 14 16:06:56 host sshd[31354]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:06:56 host sshd[31354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.113.167.3 Jan 14 16:06:58 host sshd[31354]: Failed password for invalid user xuhou from 203.113.167.3 port 56118 ssh2 Jan 14 16:09:49 host sshd[31946]: Invalid user xuanxuan from 181.176.145.42 port 33562 Jan 14 16:09:49 host sshd[31946]: input_userauth_request: invalid user xuanxuan [preauth] Jan 14 16:09:49 host sshd[31946]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:09:49 host sshd[31946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.176.145.42 Jan 14 16:09:51 host sshd[31946]: Failed password for invalid user xuanxuan from 181.176.145.42 port 33562 ssh2 Jan 14 16:09:52 host sshd[31946]: Received disconnect from 181.176.145.42 port 33562:11: Bye Bye [preauth] Jan 14 16:09:52 host sshd[31946]: Disconnected from 181.176.145.42 port 33562 [preauth] Jan 14 16:11:51 host sshd[32368]: Invalid user super from 125.229.4.85 port 54646 Jan 14 16:11:51 host sshd[32368]: input_userauth_request: invalid user super [preauth] Jan 14 16:11:51 host sshd[32368]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:11:51 host sshd[32368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.4.85 Jan 14 16:11:52 host sshd[32368]: Failed password for invalid user super from 125.229.4.85 port 54646 ssh2 Jan 14 16:11:53 host sshd[32368]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:11:55 host sshd[32368]: Failed password for invalid user super from 125.229.4.85 port 54646 ssh2 Jan 14 16:11:55 host sshd[32368]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:11:58 host sshd[32368]: Failed password for invalid user super from 125.229.4.85 port 54646 ssh2 Jan 14 16:11:59 host sshd[32368]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:12:01 host sshd[32368]: Failed password for invalid user super from 125.229.4.85 port 54646 ssh2 Jan 14 16:12:02 host sshd[32368]: Connection reset by 125.229.4.85 port 54646 [preauth] Jan 14 16:12:02 host sshd[32368]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.4.85 Jan 14 16:12:02 host sshd[32368]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 14 16:13:38 host sshd[32694]: Invalid user wangjianhua from 181.176.145.42 port 52663 Jan 14 16:13:38 host sshd[32694]: input_userauth_request: invalid user wangjianhua [preauth] Jan 14 16:13:38 host sshd[32694]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:13:38 host sshd[32694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.176.145.42 Jan 14 16:13:39 host sshd[32694]: Failed password for invalid user wangjianhua from 181.176.145.42 port 52663 ssh2 Jan 14 16:13:39 host sshd[32694]: Received disconnect from 181.176.145.42 port 52663:11: Bye Bye [preauth] Jan 14 16:13:39 host sshd[32694]: Disconnected from 181.176.145.42 port 52663 [preauth] Jan 14 16:15:00 host sshd[378]: Invalid user byungjun from 181.176.145.42 port 35858 Jan 14 16:15:00 host sshd[378]: input_userauth_request: invalid user byungjun [preauth] Jan 14 16:15:00 host sshd[378]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:15:00 host sshd[378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.176.145.42 Jan 14 16:15:02 host sshd[378]: Failed password for invalid user byungjun from 181.176.145.42 port 35858 ssh2 Jan 14 16:15:05 host sshd[437]: Invalid user Admin from 180.5.53.88 port 49952 Jan 14 16:15:05 host sshd[437]: input_userauth_request: invalid user Admin [preauth] Jan 14 16:15:05 host sshd[437]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:15:05 host sshd[437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.5.53.88 Jan 14 16:15:07 host sshd[437]: Failed password for invalid user Admin from 180.5.53.88 port 49952 ssh2 Jan 14 16:15:09 host sshd[437]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:15:10 host sshd[437]: Failed password for invalid user Admin from 180.5.53.88 port 49952 ssh2 Jan 14 16:15:12 host sshd[437]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:15:14 host sshd[437]: Failed password for invalid user Admin from 180.5.53.88 port 49952 ssh2 Jan 14 16:21:43 host sshd[1277]: User bin from 103.133.214.209 not allowed because not listed in AllowUsers Jan 14 16:21:43 host sshd[1277]: input_userauth_request: invalid user bin [preauth] Jan 14 16:21:43 host unix_chkpwd[1279]: password check failed for user (bin) Jan 14 16:21:43 host sshd[1277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.133.214.209 user=bin Jan 14 16:21:43 host sshd[1277]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "bin" Jan 14 16:21:45 host sshd[1277]: Failed password for invalid user bin from 103.133.214.209 port 54594 ssh2 Jan 14 16:21:45 host sshd[1277]: Received disconnect from 103.133.214.209 port 54594:11: Normal Shutdown, Thank you for playing [preauth] Jan 14 16:21:45 host sshd[1277]: Disconnected from 103.133.214.209 port 54594 [preauth] Jan 14 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 16:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=straightcurve user-4=wwwletsstalkfood user-5=gifterman user-6=palco123 user-7=phmetals user-8=kottayamcalldriv user-9=wwwnexidigital user-10=mrsclean user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=vfmassets user-17=wwwtestugo user-18=shalinijames user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=ugotscom user-26=cochintaxi user-27=wwwkaretakers user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 16:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 16:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PTdB2Zvhnu6iowOv.~ Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PTdB2Zvhnu6iowOv.~' Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PTdB2Zvhnu6iowOv.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 16:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 16:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 16:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 16:24:13 host sshd[1909]: User root from 121.152.79.3 not allowed because not listed in AllowUsers Jan 14 16:24:13 host sshd[1909]: input_userauth_request: invalid user root [preauth] Jan 14 16:24:13 host unix_chkpwd[1915]: password check failed for user (root) Jan 14 16:24:13 host sshd[1909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.152.79.3 user=root Jan 14 16:24:13 host sshd[1909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 16:24:16 host sshd[1909]: Failed password for invalid user root from 121.152.79.3 port 61230 ssh2 Jan 14 16:24:17 host unix_chkpwd[1920]: password check failed for user (root) Jan 14 16:24:17 host sshd[1909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 16:24:19 host sshd[1909]: Failed password for invalid user root from 121.152.79.3 port 61230 ssh2 Jan 14 16:24:20 host unix_chkpwd[1924]: password check failed for user (root) Jan 14 16:24:20 host sshd[1909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 16:24:22 host sshd[1909]: Failed password for invalid user root from 121.152.79.3 port 61230 ssh2 Jan 14 16:24:24 host unix_chkpwd[1928]: password check failed for user (root) Jan 14 16:24:24 host sshd[1909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 16:24:26 host sshd[1909]: Failed password for invalid user root from 121.152.79.3 port 61230 ssh2 Jan 14 16:24:27 host sshd[1909]: Connection reset by 121.152.79.3 port 61230 [preauth] Jan 14 16:24:27 host sshd[1909]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.152.79.3 user=root Jan 14 16:24:27 host sshd[1909]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 14 16:24:56 host sshd[2015]: Invalid user admin from 220.135.216.98 port 53835 Jan 14 16:24:56 host sshd[2015]: input_userauth_request: invalid user admin [preauth] Jan 14 16:24:56 host sshd[2015]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:24:56 host sshd[2015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.216.98 Jan 14 16:24:58 host sshd[2015]: Failed password for invalid user admin from 220.135.216.98 port 53835 ssh2 Jan 14 16:24:59 host sshd[2015]: Failed password for invalid user admin from 220.135.216.98 port 53835 ssh2 Jan 14 16:24:59 host sshd[2015]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:25:02 host sshd[2015]: Failed password for invalid user admin from 220.135.216.98 port 53835 ssh2 Jan 14 16:25:03 host sshd[2015]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:25:05 host sshd[2015]: Failed password for invalid user admin from 220.135.216.98 port 53835 ssh2 Jan 14 16:25:05 host sshd[2015]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:25:07 host sshd[2015]: Failed password for invalid user admin from 220.135.216.98 port 53835 ssh2 Jan 14 16:25:08 host sshd[2015]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:25:10 host sshd[2015]: Failed password for invalid user admin from 220.135.216.98 port 53835 ssh2 Jan 14 16:25:10 host sshd[2015]: error: maximum authentication attempts exceeded for invalid user admin from 220.135.216.98 port 53835 ssh2 [preauth] Jan 14 16:25:10 host sshd[2015]: Disconnecting: Too many authentication failures [preauth] Jan 14 16:25:10 host sshd[2015]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.216.98 Jan 14 16:25:10 host sshd[2015]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 14 16:30:18 host sshd[2755]: Invalid user telnet from 87.21.155.186 port 42909 Jan 14 16:30:18 host sshd[2755]: input_userauth_request: invalid user telnet [preauth] Jan 14 16:30:18 host sshd[2755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:30:18 host sshd[2755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.21.155.186 Jan 14 16:30:20 host sshd[2755]: Failed password for invalid user telnet from 87.21.155.186 port 42909 ssh2 Jan 14 16:30:21 host sshd[2755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:30:23 host sshd[2755]: Failed password for invalid user telnet from 87.21.155.186 port 42909 ssh2 Jan 14 16:30:24 host sshd[2755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:30:26 host sshd[2755]: Failed password for invalid user telnet from 87.21.155.186 port 42909 ssh2 Jan 14 16:30:26 host sshd[2755]: Failed password for invalid user telnet from 87.21.155.186 port 42909 ssh2 Jan 14 16:30:28 host sshd[2755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:30:30 host sshd[2755]: Failed password for invalid user telnet from 87.21.155.186 port 42909 ssh2 Jan 14 16:36:24 host sshd[3587]: Invalid user admin from 59.23.77.66 port 60802 Jan 14 16:36:24 host sshd[3587]: input_userauth_request: invalid user admin [preauth] Jan 14 16:36:24 host sshd[3587]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:36:24 host sshd[3587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.23.77.66 Jan 14 16:36:27 host sshd[3587]: Failed password for invalid user admin from 59.23.77.66 port 60802 ssh2 Jan 14 16:36:27 host sshd[3587]: Failed password for invalid user admin from 59.23.77.66 port 60802 ssh2 Jan 14 16:36:28 host sshd[3587]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:36:30 host sshd[3587]: Failed password for invalid user admin from 59.23.77.66 port 60802 ssh2 Jan 14 16:43:17 host sshd[4652]: Invalid user bzrx1098ui from 92.255.85.115 port 12884 Jan 14 16:43:17 host sshd[4652]: input_userauth_request: invalid user bzrx1098ui [preauth] Jan 14 16:43:17 host sshd[4652]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:43:17 host sshd[4652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 14 16:43:19 host sshd[4652]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 12884 ssh2 Jan 14 16:43:20 host sshd[4652]: Connection reset by 92.255.85.115 port 12884 [preauth] Jan 14 16:48:02 host sshd[5395]: Invalid user gitlab-runner from 125.228.37.39 port 39994 Jan 14 16:48:02 host sshd[5395]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 14 16:48:02 host sshd[5395]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:48:02 host sshd[5395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.37.39 Jan 14 16:48:03 host sshd[5395]: Failed password for invalid user gitlab-runner from 125.228.37.39 port 39994 ssh2 Jan 14 16:48:04 host sshd[5395]: Connection reset by 125.228.37.39 port 39994 [preauth] Jan 14 16:54:35 host sshd[6631]: Invalid user admin from 92.255.85.115 port 51859 Jan 14 16:54:35 host sshd[6631]: input_userauth_request: invalid user admin [preauth] Jan 14 16:54:35 host sshd[6631]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:54:35 host sshd[6631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 14 16:54:37 host sshd[6631]: Failed password for invalid user admin from 92.255.85.115 port 51859 ssh2 Jan 14 16:54:37 host sshd[6631]: Connection reset by 92.255.85.115 port 51859 [preauth] Jan 14 16:57:45 host sshd[7118]: Invalid user sFTPUser from 65.191.96.168 port 61442 Jan 14 16:57:45 host sshd[7118]: input_userauth_request: invalid user sFTPUser [preauth] Jan 14 16:57:45 host sshd[7118]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:57:45 host sshd[7118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.191.96.168 Jan 14 16:57:47 host sshd[7118]: Failed password for invalid user sFTPUser from 65.191.96.168 port 61442 ssh2 Jan 14 16:57:48 host sshd[7118]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:57:50 host sshd[7118]: Failed password for invalid user sFTPUser from 65.191.96.168 port 61442 ssh2 Jan 14 16:57:51 host sshd[7118]: pam_unix(sshd:auth): check pass; user unknown Jan 14 16:57:52 host sshd[7118]: Failed password for invalid user sFTPUser from 65.191.96.168 port 61442 ssh2 Jan 14 16:57:53 host sshd[7118]: Failed password for invalid user sFTPUser from 65.191.96.168 port 61442 ssh2 Jan 14 16:57:53 host sshd[7118]: Connection reset by 65.191.96.168 port 61442 [preauth] Jan 14 16:57:53 host sshd[7118]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.191.96.168 Jan 14 16:59:31 host sshd[7385]: Did not receive identification string from 223.245.0.5 port 45110 Jan 14 17:01:02 host sshd[7684]: Invalid user pi from 59.127.37.187 port 60412 Jan 14 17:01:02 host sshd[7684]: input_userauth_request: invalid user pi [preauth] Jan 14 17:01:02 host sshd[7684]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:01:02 host sshd[7684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.37.187 Jan 14 17:01:04 host sshd[7684]: Failed password for invalid user pi from 59.127.37.187 port 60412 ssh2 Jan 14 17:01:04 host sshd[7684]: Connection reset by 59.127.37.187 port 60412 [preauth] Jan 14 17:05:18 host sshd[8189]: Invalid user support from 92.255.85.115 port 25603 Jan 14 17:05:18 host sshd[8189]: input_userauth_request: invalid user support [preauth] Jan 14 17:05:19 host sshd[8189]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:05:19 host sshd[8189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 14 17:05:20 host sshd[8189]: Failed password for invalid user support from 92.255.85.115 port 25603 ssh2 Jan 14 17:06:28 host sshd[8437]: Invalid user admin from 59.126.61.118 port 39057 Jan 14 17:06:28 host sshd[8437]: input_userauth_request: invalid user admin [preauth] Jan 14 17:06:28 host sshd[8437]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:06:28 host sshd[8437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.61.118 Jan 14 17:06:30 host sshd[8437]: Failed password for invalid user admin from 59.126.61.118 port 39057 ssh2 Jan 14 17:06:31 host sshd[8437]: Failed password for invalid user admin from 59.126.61.118 port 39057 ssh2 Jan 14 17:06:32 host sshd[8437]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:06:35 host sshd[8437]: Failed password for invalid user admin from 59.126.61.118 port 39057 ssh2 Jan 14 17:06:36 host sshd[8437]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:06:38 host sshd[8437]: Failed password for invalid user admin from 59.126.61.118 port 39057 ssh2 Jan 14 17:06:39 host sshd[8437]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:06:41 host sshd[8437]: Failed password for invalid user admin from 59.126.61.118 port 39057 ssh2 Jan 14 17:16:49 host sshd[9911]: Invalid user e from 194.110.203.109 port 44580 Jan 14 17:16:49 host sshd[9911]: input_userauth_request: invalid user e [preauth] Jan 14 17:16:49 host sshd[9911]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:16:49 host sshd[9911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 17:16:50 host sshd[9911]: Failed password for invalid user e from 194.110.203.109 port 44580 ssh2 Jan 14 17:16:53 host sshd[9911]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:16:56 host sshd[9911]: Failed password for invalid user e from 194.110.203.109 port 44580 ssh2 Jan 14 17:16:59 host sshd[9911]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:17:01 host sshd[9911]: Failed password for invalid user e from 194.110.203.109 port 44580 ssh2 Jan 14 17:17:04 host sshd[9911]: Connection closed by 194.110.203.109 port 44580 [preauth] Jan 14 17:17:04 host sshd[9911]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 17:21:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:21:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwrmswll user-2=wwwresourcehunte user-3=keralaholi user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=wwwnexidigital user-13=mrsclean user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=wwwtestugo user-25=shalinijames user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=remysagr user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 17:22:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 17:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sBtcCtfwJ1wucH7L.~ Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sBtcCtfwJ1wucH7L.~' Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sBtcCtfwJ1wucH7L.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 17:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 17:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 17:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 17:23:22 host sshd[11167]: Invalid user bigipuser3 from 14.63.10.144 port 60281 Jan 14 17:23:22 host sshd[11167]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 14 17:23:22 host sshd[11167]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:23:22 host sshd[11167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.10.144 Jan 14 17:23:25 host sshd[11167]: Failed password for invalid user bigipuser3 from 14.63.10.144 port 60281 ssh2 Jan 14 17:23:25 host sshd[11167]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:23:26 host sshd[11167]: Failed password for invalid user bigipuser3 from 14.63.10.144 port 60281 ssh2 Jan 14 17:23:28 host sshd[11167]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:23:30 host sshd[11167]: Failed password for invalid user bigipuser3 from 14.63.10.144 port 60281 ssh2 Jan 14 17:23:31 host sshd[11167]: Failed password for invalid user bigipuser3 from 14.63.10.144 port 60281 ssh2 Jan 14 17:23:31 host sshd[11167]: Connection closed by 14.63.10.144 port 60281 [preauth] Jan 14 17:23:31 host sshd[11167]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.10.144 Jan 14 17:28:52 host sshd[11921]: Invalid user admin from 115.160.124.219 port 58432 Jan 14 17:28:52 host sshd[11921]: input_userauth_request: invalid user admin [preauth] Jan 14 17:28:52 host sshd[11921]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:28:52 host sshd[11921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.160.124.219 Jan 14 17:28:53 host sshd[11921]: Failed password for invalid user admin from 115.160.124.219 port 58432 ssh2 Jan 14 17:28:54 host sshd[11921]: Failed password for invalid user admin from 115.160.124.219 port 58432 ssh2 Jan 14 17:28:54 host sshd[11921]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:28:57 host sshd[11921]: Failed password for invalid user admin from 115.160.124.219 port 58432 ssh2 Jan 14 17:28:57 host sshd[11921]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:28:59 host sshd[11921]: Failed password for invalid user admin from 115.160.124.219 port 58432 ssh2 Jan 14 17:29:00 host sshd[11921]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:29:02 host sshd[11921]: Failed password for invalid user admin from 115.160.124.219 port 58432 ssh2 Jan 14 17:34:03 host sshd[12664]: Invalid user nginx from 112.163.17.25 port 33047 Jan 14 17:34:03 host sshd[12664]: input_userauth_request: invalid user nginx [preauth] Jan 14 17:34:03 host sshd[12664]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:34:03 host sshd[12664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.163.17.25 Jan 14 17:34:04 host sshd[12664]: Failed password for invalid user nginx from 112.163.17.25 port 33047 ssh2 Jan 14 17:34:05 host sshd[12664]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:34:08 host sshd[12664]: Failed password for invalid user nginx from 112.163.17.25 port 33047 ssh2 Jan 14 17:34:08 host sshd[12664]: Connection reset by 112.163.17.25 port 33047 [preauth] Jan 14 17:34:08 host sshd[12664]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.163.17.25 Jan 14 17:36:47 host sshd[13091]: Invalid user vadmin from 220.119.65.20 port 63668 Jan 14 17:36:47 host sshd[13091]: input_userauth_request: invalid user vadmin [preauth] Jan 14 17:36:47 host sshd[13091]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:36:47 host sshd[13091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.119.65.20 Jan 14 17:36:49 host sshd[13091]: Failed password for invalid user vadmin from 220.119.65.20 port 63668 ssh2 Jan 14 17:36:49 host sshd[13091]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:36:51 host sshd[13091]: Failed password for invalid user vadmin from 220.119.65.20 port 63668 ssh2 Jan 14 17:36:52 host sshd[13091]: Failed password for invalid user vadmin from 220.119.65.20 port 63668 ssh2 Jan 14 17:36:52 host sshd[13091]: Connection closed by 220.119.65.20 port 63668 [preauth] Jan 14 17:36:52 host sshd[13091]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.119.65.20 Jan 14 17:40:26 host sshd[13543]: User root from 125.254.18.93 not allowed because not listed in AllowUsers Jan 14 17:40:26 host sshd[13543]: input_userauth_request: invalid user root [preauth] Jan 14 17:40:26 host unix_chkpwd[13675]: password check failed for user (root) Jan 14 17:40:26 host sshd[13543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.254.18.93 user=root Jan 14 17:40:26 host sshd[13543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 17:40:28 host sshd[13543]: Failed password for invalid user root from 125.254.18.93 port 57712 ssh2 Jan 14 17:40:30 host unix_chkpwd[13700]: password check failed for user (root) Jan 14 17:40:30 host sshd[13543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 17:40:32 host sshd[13543]: Failed password for invalid user root from 125.254.18.93 port 57712 ssh2 Jan 14 17:40:37 host sshd[13543]: Connection reset by 125.254.18.93 port 57712 [preauth] Jan 14 17:40:37 host sshd[13543]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.254.18.93 user=root Jan 14 17:41:13 host sshd[13732]: User ftp from 125.254.18.93 not allowed because not listed in AllowUsers Jan 14 17:41:13 host sshd[13732]: input_userauth_request: invalid user ftp [preauth] Jan 14 17:41:13 host unix_chkpwd[13776]: password check failed for user (ftp) Jan 14 17:41:13 host sshd[13732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.254.18.93 user=ftp Jan 14 17:41:13 host sshd[13732]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 14 17:41:15 host sshd[13732]: Failed password for invalid user ftp from 125.254.18.93 port 57833 ssh2 Jan 14 17:48:59 host sshd[14749]: Invalid user zyfwp from 220.135.36.28 port 38117 Jan 14 17:48:59 host sshd[14749]: input_userauth_request: invalid user zyfwp [preauth] Jan 14 17:48:59 host sshd[14749]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:48:59 host sshd[14749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.36.28 Jan 14 17:49:01 host sshd[14749]: Failed password for invalid user zyfwp from 220.135.36.28 port 38117 ssh2 Jan 14 17:49:02 host sshd[14749]: Connection reset by 220.135.36.28 port 38117 [preauth] Jan 14 17:49:32 host sshd[14789]: Connection closed by 167.94.138.63 port 45126 [preauth] Jan 14 17:50:25 host sshd[14912]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 192.241.216.16 port 46904 Jan 14 17:51:10 host sshd[15007]: Invalid user usr from 72.75.250.21 port 35076 Jan 14 17:51:10 host sshd[15007]: input_userauth_request: invalid user usr [preauth] Jan 14 17:51:11 host sshd[15007]: pam_unix(sshd:auth): check pass; user unknown Jan 14 17:51:11 host sshd[15007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.75.250.21 Jan 14 17:51:13 host sshd[15007]: Failed password for invalid user usr from 72.75.250.21 port 35076 ssh2 Jan 14 17:51:13 host sshd[15007]: Connection reset by 72.75.250.21 port 35076 [preauth] Jan 14 18:03:24 host sshd[16550]: User root from 62.233.50.248 not allowed because not listed in AllowUsers Jan 14 18:03:24 host sshd[16550]: input_userauth_request: invalid user root [preauth] Jan 14 18:03:24 host unix_chkpwd[16552]: password check failed for user (root) Jan 14 18:03:24 host sshd[16550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 user=root Jan 14 18:03:24 host sshd[16550]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 18:03:27 host sshd[16550]: Failed password for invalid user root from 62.233.50.248 port 49528 ssh2 Jan 14 18:03:27 host sshd[16550]: Received disconnect from 62.233.50.248 port 49528:11: Client disconnecting normally [preauth] Jan 14 18:03:27 host sshd[16550]: Disconnected from 62.233.50.248 port 49528 [preauth] Jan 14 18:03:28 host sshd[16556]: Invalid user ubnt from 62.233.50.248 port 52937 Jan 14 18:03:28 host sshd[16556]: input_userauth_request: invalid user ubnt [preauth] Jan 14 18:03:28 host sshd[16556]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:03:28 host sshd[16556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 14 18:03:30 host sshd[16556]: Failed password for invalid user ubnt from 62.233.50.248 port 52937 ssh2 Jan 14 18:03:31 host sshd[16556]: Received disconnect from 62.233.50.248 port 52937:11: Client disconnecting normally [preauth] Jan 14 18:03:31 host sshd[16556]: Disconnected from 62.233.50.248 port 52937 [preauth] Jan 14 18:03:32 host sshd[16582]: Invalid user support from 62.233.50.248 port 56565 Jan 14 18:03:32 host sshd[16582]: input_userauth_request: invalid user support [preauth] Jan 14 18:03:32 host sshd[16582]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:03:32 host sshd[16582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 14 18:03:34 host sshd[16582]: Failed password for invalid user support from 62.233.50.248 port 56565 ssh2 Jan 14 18:04:41 host sshd[16838]: Invalid user fdelpozo from 159.223.32.24 port 35386 Jan 14 18:04:41 host sshd[16838]: input_userauth_request: invalid user fdelpozo [preauth] Jan 14 18:04:41 host sshd[16838]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:04:41 host sshd[16838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.32.24 Jan 14 18:04:43 host sshd[16838]: Failed password for invalid user fdelpozo from 159.223.32.24 port 35386 ssh2 Jan 14 18:04:43 host sshd[16838]: Received disconnect from 159.223.32.24 port 35386:11: Bye Bye [preauth] Jan 14 18:04:43 host sshd[16838]: Disconnected from 159.223.32.24 port 35386 [preauth] Jan 14 18:05:23 host sshd[16910]: Invalid user yingyingluo from 68.21.145.132 port 50998 Jan 14 18:05:23 host sshd[16910]: input_userauth_request: invalid user yingyingluo [preauth] Jan 14 18:05:23 host sshd[16910]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:05:23 host sshd[16910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.21.145.132 Jan 14 18:05:25 host sshd[16910]: Failed password for invalid user yingyingluo from 68.21.145.132 port 50998 ssh2 Jan 14 18:05:25 host sshd[16910]: Received disconnect from 68.21.145.132 port 50998:11: Bye Bye [preauth] Jan 14 18:05:25 host sshd[16910]: Disconnected from 68.21.145.132 port 50998 [preauth] Jan 14 18:06:15 host sshd[17001]: Invalid user zhangping from 43.155.177.101 port 54572 Jan 14 18:06:15 host sshd[17001]: input_userauth_request: invalid user zhangping [preauth] Jan 14 18:06:15 host sshd[17001]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:06:15 host sshd[17001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.177.101 Jan 14 18:06:17 host sshd[17001]: Failed password for invalid user zhangping from 43.155.177.101 port 54572 ssh2 Jan 14 18:06:17 host sshd[17001]: Received disconnect from 43.155.177.101 port 54572:11: Bye Bye [preauth] Jan 14 18:06:17 host sshd[17001]: Disconnected from 43.155.177.101 port 54572 [preauth] Jan 14 18:06:39 host sshd[17062]: Invalid user liu from 15.235.146.31 port 49054 Jan 14 18:06:39 host sshd[17062]: input_userauth_request: invalid user liu [preauth] Jan 14 18:06:39 host sshd[17062]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:06:39 host sshd[17062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.235.146.31 Jan 14 18:06:41 host sshd[17062]: Failed password for invalid user liu from 15.235.146.31 port 49054 ssh2 Jan 14 18:06:41 host sshd[17062]: Received disconnect from 15.235.146.31 port 49054:11: Bye Bye [preauth] Jan 14 18:06:41 host sshd[17062]: Disconnected from 15.235.146.31 port 49054 [preauth] Jan 14 18:09:09 host sshd[17385]: Invalid user mahuanhuan from 159.65.103.250 port 56054 Jan 14 18:09:09 host sshd[17385]: input_userauth_request: invalid user mahuanhuan [preauth] Jan 14 18:09:09 host sshd[17385]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:09:09 host sshd[17385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.103.250 Jan 14 18:09:11 host sshd[17385]: Failed password for invalid user mahuanhuan from 159.65.103.250 port 56054 ssh2 Jan 14 18:09:11 host sshd[17385]: Received disconnect from 159.65.103.250 port 56054:11: Bye Bye [preauth] Jan 14 18:09:11 host sshd[17385]: Disconnected from 159.65.103.250 port 56054 [preauth] Jan 14 18:09:27 host sshd[17490]: Invalid user bharath from 147.182.185.141 port 41532 Jan 14 18:09:27 host sshd[17490]: input_userauth_request: invalid user bharath [preauth] Jan 14 18:09:27 host sshd[17490]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:09:27 host sshd[17490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.185.141 Jan 14 18:09:28 host sshd[17490]: Failed password for invalid user bharath from 147.182.185.141 port 41532 ssh2 Jan 14 18:09:29 host sshd[17490]: Received disconnect from 147.182.185.141 port 41532:11: Bye Bye [preauth] Jan 14 18:09:29 host sshd[17490]: Disconnected from 147.182.185.141 port 41532 [preauth] Jan 14 18:10:00 host sshd[17607]: Invalid user hpearsonnadal from 59.150.105.114 port 33855 Jan 14 18:10:00 host sshd[17607]: input_userauth_request: invalid user hpearsonnadal [preauth] Jan 14 18:10:00 host sshd[17607]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:10:00 host sshd[17607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.150.105.114 Jan 14 18:10:02 host sshd[17607]: Failed password for invalid user hpearsonnadal from 59.150.105.114 port 33855 ssh2 Jan 14 18:10:02 host sshd[17628]: Invalid user tianshi from 68.21.145.132 port 43600 Jan 14 18:10:02 host sshd[17628]: input_userauth_request: invalid user tianshi [preauth] Jan 14 18:10:02 host sshd[17628]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:10:02 host sshd[17628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.21.145.132 Jan 14 18:10:02 host sshd[17607]: Received disconnect from 59.150.105.114 port 33855:11: Bye Bye [preauth] Jan 14 18:10:02 host sshd[17607]: Disconnected from 59.150.105.114 port 33855 [preauth] Jan 14 18:10:04 host sshd[17628]: Failed password for invalid user tianshi from 68.21.145.132 port 43600 ssh2 Jan 14 18:10:05 host sshd[17628]: Received disconnect from 68.21.145.132 port 43600:11: Bye Bye [preauth] Jan 14 18:10:05 host sshd[17628]: Disconnected from 68.21.145.132 port 43600 [preauth] Jan 14 18:10:58 host sshd[17721]: Invalid user fdelpozo from 159.65.103.250 port 59012 Jan 14 18:10:58 host sshd[17721]: input_userauth_request: invalid user fdelpozo [preauth] Jan 14 18:10:58 host sshd[17721]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:10:58 host sshd[17721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.103.250 Jan 14 18:11:00 host sshd[17721]: Failed password for invalid user fdelpozo from 159.65.103.250 port 59012 ssh2 Jan 14 18:11:00 host sshd[17721]: Received disconnect from 159.65.103.250 port 59012:11: Bye Bye [preauth] Jan 14 18:11:00 host sshd[17721]: Disconnected from 159.65.103.250 port 59012 [preauth] Jan 14 18:11:13 host sshd[17754]: Invalid user ldyer from 159.223.32.24 port 34862 Jan 14 18:11:13 host sshd[17754]: input_userauth_request: invalid user ldyer [preauth] Jan 14 18:11:13 host sshd[17754]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:11:13 host sshd[17754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.32.24 Jan 14 18:11:13 host sshd[17752]: Invalid user fdelpozo from 68.21.145.132 port 42622 Jan 14 18:11:13 host sshd[17752]: input_userauth_request: invalid user fdelpozo [preauth] Jan 14 18:11:13 host sshd[17752]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:11:13 host sshd[17752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.21.145.132 Jan 14 18:11:14 host sshd[17757]: Invalid user david from 43.155.177.101 port 46736 Jan 14 18:11:14 host sshd[17757]: input_userauth_request: invalid user david [preauth] Jan 14 18:11:14 host sshd[17757]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:11:14 host sshd[17757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.177.101 Jan 14 18:11:15 host sshd[17754]: Failed password for invalid user ldyer from 159.223.32.24 port 34862 ssh2 Jan 14 18:11:15 host sshd[17754]: Received disconnect from 159.223.32.24 port 34862:11: Bye Bye [preauth] Jan 14 18:11:15 host sshd[17754]: Disconnected from 159.223.32.24 port 34862 [preauth] Jan 14 18:11:15 host sshd[17757]: Failed password for invalid user david from 43.155.177.101 port 46736 ssh2 Jan 14 18:11:15 host sshd[17757]: Received disconnect from 43.155.177.101 port 46736:11: Bye Bye [preauth] Jan 14 18:11:15 host sshd[17757]: Disconnected from 43.155.177.101 port 46736 [preauth] Jan 14 18:11:16 host sshd[17752]: Failed password for invalid user fdelpozo from 68.21.145.132 port 42622 ssh2 Jan 14 18:11:16 host sshd[17752]: Received disconnect from 68.21.145.132 port 42622:11: Bye Bye [preauth] Jan 14 18:11:16 host sshd[17752]: Disconnected from 68.21.145.132 port 42622 [preauth] Jan 14 18:11:40 host sshd[17833]: Invalid user mahuanhuan from 59.150.105.114 port 60781 Jan 14 18:11:40 host sshd[17833]: input_userauth_request: invalid user mahuanhuan [preauth] Jan 14 18:11:40 host sshd[17833]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:11:40 host sshd[17833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.150.105.114 Jan 14 18:11:42 host sshd[17833]: Failed password for invalid user mahuanhuan from 59.150.105.114 port 60781 ssh2 Jan 14 18:11:42 host sshd[17833]: Received disconnect from 59.150.105.114 port 60781:11: Bye Bye [preauth] Jan 14 18:11:42 host sshd[17833]: Disconnected from 59.150.105.114 port 60781 [preauth] Jan 14 18:11:48 host sshd[17850]: Invalid user ziyu from 15.235.146.31 port 58000 Jan 14 18:11:48 host sshd[17850]: input_userauth_request: invalid user ziyu [preauth] Jan 14 18:11:48 host sshd[17850]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:11:48 host sshd[17850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.235.146.31 Jan 14 18:11:48 host sshd[17847]: Invalid user ziyu from 147.182.185.141 port 41628 Jan 14 18:11:48 host sshd[17847]: input_userauth_request: invalid user ziyu [preauth] Jan 14 18:11:48 host sshd[17847]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:11:48 host sshd[17847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.185.141 Jan 14 18:11:50 host sshd[17850]: Failed password for invalid user ziyu from 15.235.146.31 port 58000 ssh2 Jan 14 18:11:51 host sshd[17850]: Received disconnect from 15.235.146.31 port 58000:11: Bye Bye [preauth] Jan 14 18:11:51 host sshd[17850]: Disconnected from 15.235.146.31 port 58000 [preauth] Jan 14 18:11:51 host sshd[17847]: Failed password for invalid user ziyu from 147.182.185.141 port 41628 ssh2 Jan 14 18:11:51 host sshd[17847]: Received disconnect from 147.182.185.141 port 41628:11: Bye Bye [preauth] Jan 14 18:11:51 host sshd[17847]: Disconnected from 147.182.185.141 port 41628 [preauth] Jan 14 18:12:09 host sshd[17882]: Invalid user bharath from 159.65.103.250 port 57772 Jan 14 18:12:09 host sshd[17882]: input_userauth_request: invalid user bharath [preauth] Jan 14 18:12:09 host sshd[17882]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:12:09 host sshd[17882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.103.250 Jan 14 18:12:11 host sshd[17882]: Failed password for invalid user bharath from 159.65.103.250 port 57772 ssh2 Jan 14 18:12:11 host sshd[17882]: Received disconnect from 159.65.103.250 port 57772:11: Bye Bye [preauth] Jan 14 18:12:11 host sshd[17882]: Disconnected from 159.65.103.250 port 57772 [preauth] Jan 14 18:12:34 host sshd[17967]: Invalid user bdeng from 159.223.32.24 port 56986 Jan 14 18:12:34 host sshd[17967]: input_userauth_request: invalid user bdeng [preauth] Jan 14 18:12:34 host sshd[17967]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:12:34 host sshd[17967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.32.24 Jan 14 18:12:36 host sshd[17967]: Failed password for invalid user bdeng from 159.223.32.24 port 56986 ssh2 Jan 14 18:12:36 host sshd[17967]: Received disconnect from 159.223.32.24 port 56986:11: Bye Bye [preauth] Jan 14 18:12:36 host sshd[17967]: Disconnected from 159.223.32.24 port 56986 [preauth] Jan 14 18:12:47 host sshd[18016]: Invalid user comsol from 43.155.177.101 port 45628 Jan 14 18:12:47 host sshd[18016]: input_userauth_request: invalid user comsol [preauth] Jan 14 18:12:47 host sshd[18016]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:12:47 host sshd[18016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.177.101 Jan 14 18:12:49 host sshd[18016]: Failed password for invalid user comsol from 43.155.177.101 port 45628 ssh2 Jan 14 18:12:49 host sshd[18016]: Received disconnect from 43.155.177.101 port 45628:11: Bye Bye [preauth] Jan 14 18:12:49 host sshd[18016]: Disconnected from 43.155.177.101 port 45628 [preauth] Jan 14 18:13:09 host sshd[18085]: Invalid user zhangpeng from 15.235.146.31 port 58186 Jan 14 18:13:09 host sshd[18085]: input_userauth_request: invalid user zhangpeng [preauth] Jan 14 18:13:09 host sshd[18085]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:13:09 host sshd[18085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.235.146.31 Jan 14 18:13:11 host sshd[18085]: Failed password for invalid user zhangpeng from 15.235.146.31 port 58186 ssh2 Jan 14 18:13:11 host sshd[18085]: Received disconnect from 15.235.146.31 port 58186:11: Bye Bye [preauth] Jan 14 18:13:11 host sshd[18085]: Disconnected from 15.235.146.31 port 58186 [preauth] Jan 14 18:13:16 host sshd[18124]: Invalid user fanchuanshi from 59.150.105.114 port 23450 Jan 14 18:13:16 host sshd[18124]: input_userauth_request: invalid user fanchuanshi [preauth] Jan 14 18:13:16 host sshd[18124]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:13:16 host sshd[18124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.150.105.114 Jan 14 18:13:18 host sshd[18124]: Failed password for invalid user fanchuanshi from 59.150.105.114 port 23450 ssh2 Jan 14 18:14:02 host sshd[18226]: Invalid user chenyan from 147.182.185.141 port 41722 Jan 14 18:14:02 host sshd[18226]: input_userauth_request: invalid user chenyan [preauth] Jan 14 18:14:02 host sshd[18226]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:14:02 host sshd[18226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.185.141 Jan 14 18:14:04 host sshd[18226]: Failed password for invalid user chenyan from 147.182.185.141 port 41722 ssh2 Jan 14 18:14:05 host sshd[18226]: Received disconnect from 147.182.185.141 port 41722:11: Bye Bye [preauth] Jan 14 18:14:05 host sshd[18226]: Disconnected from 147.182.185.141 port 41722 [preauth] Jan 14 18:16:49 host sshd[18700]: Connection closed by 172.104.11.34 port 45952 [preauth] Jan 14 18:16:50 host sshd[18704]: Connection closed by 172.104.11.34 port 45954 [preauth] Jan 14 18:16:52 host sshd[18707]: Connection closed by 172.104.11.34 port 45956 [preauth] Jan 14 18:21:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=bonifacegroup user-4=wwwevmhonda user-5=mrsclean user-6=wwwnexidigital user-7=gifterman user-8=palco123 user-9=phmetals user-10=kottayamcalldriv user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=wwwpmcresource user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 18:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gwnjBGhWyEoQiXy1.~ Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gwnjBGhWyEoQiXy1.~' Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gwnjBGhWyEoQiXy1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 18:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 18:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 18:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 18:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 18:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 18:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 18:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 18:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 18:32:39 host sshd[20866]: Invalid user pi from 59.18.170.127 port 49959 Jan 14 18:32:39 host sshd[20866]: input_userauth_request: invalid user pi [preauth] Jan 14 18:32:39 host sshd[20866]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:32:39 host sshd[20866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.18.170.127 Jan 14 18:32:41 host sshd[20866]: Failed password for invalid user pi from 59.18.170.127 port 49959 ssh2 Jan 14 18:32:43 host sshd[20866]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:32:45 host sshd[20866]: Failed password for invalid user pi from 59.18.170.127 port 49959 ssh2 Jan 14 18:32:46 host sshd[20866]: Connection reset by 59.18.170.127 port 49959 [preauth] Jan 14 18:32:46 host sshd[20866]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.18.170.127 Jan 14 18:49:42 host sshd[23023]: Invalid user earl from 107.189.30.59 port 47256 Jan 14 18:49:42 host sshd[23023]: input_userauth_request: invalid user earl [preauth] Jan 14 18:49:42 host sshd[23023]: pam_unix(sshd:auth): check pass; user unknown Jan 14 18:49:42 host sshd[23023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 14 18:49:44 host sshd[23023]: Failed password for invalid user earl from 107.189.30.59 port 47256 ssh2 Jan 14 18:49:45 host sshd[23023]: Connection closed by 107.189.30.59 port 47256 [preauth] Jan 14 19:00:36 host sshd[24476]: User root from 31.165.41.196 not allowed because not listed in AllowUsers Jan 14 19:00:36 host sshd[24476]: input_userauth_request: invalid user root [preauth] Jan 14 19:00:36 host unix_chkpwd[24480]: password check failed for user (root) Jan 14 19:00:36 host sshd[24476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.165.41.196 user=root Jan 14 19:00:36 host sshd[24476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 19:00:38 host sshd[24476]: Failed password for invalid user root from 31.165.41.196 port 44084 ssh2 Jan 14 19:00:39 host unix_chkpwd[24485]: password check failed for user (root) Jan 14 19:00:39 host sshd[24476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 19:00:40 host sshd[24476]: Failed password for invalid user root from 31.165.41.196 port 44084 ssh2 Jan 14 19:00:42 host unix_chkpwd[24488]: password check failed for user (root) Jan 14 19:00:42 host sshd[24476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 19:00:44 host sshd[24476]: Failed password for invalid user root from 31.165.41.196 port 44084 ssh2 Jan 14 19:00:44 host unix_chkpwd[24508]: password check failed for user (root) Jan 14 19:00:44 host sshd[24476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 19:00:46 host sshd[24476]: Failed password for invalid user root from 31.165.41.196 port 44084 ssh2 Jan 14 19:00:47 host unix_chkpwd[24511]: password check failed for user (root) Jan 14 19:00:47 host sshd[24476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 19:00:48 host sshd[24476]: Failed password for invalid user root from 31.165.41.196 port 44084 ssh2 Jan 14 19:03:15 host sshd[24920]: Invalid user ea from 194.110.203.109 port 35382 Jan 14 19:03:15 host sshd[24920]: input_userauth_request: invalid user ea [preauth] Jan 14 19:03:15 host sshd[24920]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:03:15 host sshd[24920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 19:03:17 host sshd[24920]: Failed password for invalid user ea from 194.110.203.109 port 35382 ssh2 Jan 14 19:03:20 host sshd[24920]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:03:23 host sshd[24920]: Failed password for invalid user ea from 194.110.203.109 port 35382 ssh2 Jan 14 19:03:26 host sshd[24920]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:03:29 host sshd[24920]: Failed password for invalid user ea from 194.110.203.109 port 35382 ssh2 Jan 14 19:03:32 host sshd[24920]: Connection closed by 194.110.203.109 port 35382 [preauth] Jan 14 19:03:32 host sshd[24920]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 19:05:23 host sshd[25202]: Invalid user rwa from 205.185.113.129 port 41980 Jan 14 19:05:23 host sshd[25202]: input_userauth_request: invalid user rwa [preauth] Jan 14 19:05:23 host sshd[25202]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:05:23 host sshd[25202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 14 19:05:25 host sshd[25202]: Failed password for invalid user rwa from 205.185.113.129 port 41980 ssh2 Jan 14 19:05:26 host sshd[25202]: Connection closed by 205.185.113.129 port 41980 [preauth] Jan 14 19:07:16 host sshd[25437]: Invalid user zyfwp from 103.133.214.219 port 50856 Jan 14 19:07:16 host sshd[25437]: input_userauth_request: invalid user zyfwp [preauth] Jan 14 19:07:16 host sshd[25437]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:07:16 host sshd[25437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.133.214.219 Jan 14 19:07:18 host sshd[25437]: Failed password for invalid user zyfwp from 103.133.214.219 port 50856 ssh2 Jan 14 19:07:18 host sshd[25437]: Received disconnect from 103.133.214.219 port 50856:11: Normal Shutdown, Thank you for playing [preauth] Jan 14 19:07:18 host sshd[25437]: Disconnected from 103.133.214.219 port 50856 [preauth] Jan 14 19:10:15 host sshd[25920]: Invalid user zhouli from 139.59.23.154 port 45332 Jan 14 19:10:15 host sshd[25920]: input_userauth_request: invalid user zhouli [preauth] Jan 14 19:10:15 host sshd[25920]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:10:15 host sshd[25920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.154 Jan 14 19:10:17 host sshd[25920]: Failed password for invalid user zhouli from 139.59.23.154 port 45332 ssh2 Jan 14 19:10:17 host sshd[25920]: Received disconnect from 139.59.23.154 port 45332:11: Bye Bye [preauth] Jan 14 19:10:17 host sshd[25920]: Disconnected from 139.59.23.154 port 45332 [preauth] Jan 14 19:10:49 host sshd[25993]: User ftp from 220.135.21.20 not allowed because not listed in AllowUsers Jan 14 19:10:49 host sshd[25993]: input_userauth_request: invalid user ftp [preauth] Jan 14 19:10:49 host unix_chkpwd[25998]: password check failed for user (ftp) Jan 14 19:10:49 host sshd[25993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.21.20 user=ftp Jan 14 19:10:49 host sshd[25993]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 14 19:10:51 host sshd[25993]: Failed password for invalid user ftp from 220.135.21.20 port 55164 ssh2 Jan 14 19:10:52 host unix_chkpwd[26007]: password check failed for user (ftp) Jan 14 19:10:52 host sshd[25993]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 14 19:10:53 host sshd[25993]: Failed password for invalid user ftp from 220.135.21.20 port 55164 ssh2 Jan 14 19:10:56 host unix_chkpwd[26013]: password check failed for user (ftp) Jan 14 19:10:56 host sshd[25993]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 14 19:10:59 host sshd[25993]: Failed password for invalid user ftp from 220.135.21.20 port 55164 ssh2 Jan 14 19:11:01 host sshd[25993]: Failed password for invalid user ftp from 220.135.21.20 port 55164 ssh2 Jan 14 19:11:02 host unix_chkpwd[26031]: password check failed for user (ftp) Jan 14 19:11:02 host sshd[25993]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 14 19:11:04 host sshd[25993]: Failed password for invalid user ftp from 220.135.21.20 port 55164 ssh2 Jan 14 19:11:20 host sshd[26082]: Invalid user liyong from 213.230.120.17 port 42262 Jan 14 19:11:20 host sshd[26082]: input_userauth_request: invalid user liyong [preauth] Jan 14 19:11:20 host sshd[26082]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:11:20 host sshd[26082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.120.17 Jan 14 19:11:22 host sshd[26082]: Failed password for invalid user liyong from 213.230.120.17 port 42262 ssh2 Jan 14 19:11:23 host sshd[26082]: Received disconnect from 213.230.120.17 port 42262:11: Bye Bye [preauth] Jan 14 19:11:23 host sshd[26082]: Disconnected from 213.230.120.17 port 42262 [preauth] Jan 14 19:12:17 host sshd[26193]: Invalid user ekooistramanning from 68.183.142.49 port 36004 Jan 14 19:12:17 host sshd[26193]: input_userauth_request: invalid user ekooistramanning [preauth] Jan 14 19:12:17 host sshd[26193]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:12:17 host sshd[26193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.142.49 Jan 14 19:12:18 host sshd[26196]: Invalid user nibaba from 122.117.51.33 port 38032 Jan 14 19:12:18 host sshd[26196]: input_userauth_request: invalid user nibaba [preauth] Jan 14 19:12:18 host sshd[26196]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:12:18 host sshd[26196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.51.33 Jan 14 19:12:19 host sshd[26193]: Failed password for invalid user ekooistramanning from 68.183.142.49 port 36004 ssh2 Jan 14 19:12:19 host sshd[26193]: Received disconnect from 68.183.142.49 port 36004:11: Bye Bye [preauth] Jan 14 19:12:19 host sshd[26193]: Disconnected from 68.183.142.49 port 36004 [preauth] Jan 14 19:12:20 host sshd[26196]: Failed password for invalid user nibaba from 122.117.51.33 port 38032 ssh2 Jan 14 19:12:20 host sshd[26196]: Received disconnect from 122.117.51.33 port 38032:11: Bye Bye [preauth] Jan 14 19:12:20 host sshd[26196]: Disconnected from 122.117.51.33 port 38032 [preauth] Jan 14 19:13:46 host sshd[26528]: Invalid user lijia from 217.64.140.182 port 48156 Jan 14 19:13:46 host sshd[26528]: input_userauth_request: invalid user lijia [preauth] Jan 14 19:13:46 host sshd[26528]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:13:46 host sshd[26528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.64.140.182 Jan 14 19:13:48 host sshd[26528]: Failed password for invalid user lijia from 217.64.140.182 port 48156 ssh2 Jan 14 19:13:48 host sshd[26528]: Received disconnect from 217.64.140.182 port 48156:11: Bye Bye [preauth] Jan 14 19:13:48 host sshd[26528]: Disconnected from 217.64.140.182 port 48156 [preauth] Jan 14 19:13:58 host sshd[26543]: Invalid user zhouli from 51.68.224.114 port 48614 Jan 14 19:13:58 host sshd[26543]: input_userauth_request: invalid user zhouli [preauth] Jan 14 19:13:58 host sshd[26543]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:13:58 host sshd[26543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.224.114 Jan 14 19:14:00 host sshd[26543]: Failed password for invalid user zhouli from 51.68.224.114 port 48614 ssh2 Jan 14 19:14:00 host sshd[26543]: Received disconnect from 51.68.224.114 port 48614:11: Bye Bye [preauth] Jan 14 19:14:00 host sshd[26543]: Disconnected from 51.68.224.114 port 48614 [preauth] Jan 14 19:15:11 host sshd[26705]: Invalid user zhangfan from 175.196.245.105 port 53516 Jan 14 19:15:11 host sshd[26705]: input_userauth_request: invalid user zhangfan [preauth] Jan 14 19:15:11 host sshd[26705]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:15:11 host sshd[26705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.245.105 Jan 14 19:15:13 host sshd[26705]: Failed password for invalid user zhangfan from 175.196.245.105 port 53516 ssh2 Jan 14 19:15:13 host sshd[26705]: Received disconnect from 175.196.245.105 port 53516:11: Bye Bye [preauth] Jan 14 19:15:13 host sshd[26705]: Disconnected from 175.196.245.105 port 53516 [preauth] Jan 14 19:15:48 host sshd[26794]: Invalid user pi from 14.47.76.3 port 62697 Jan 14 19:15:48 host sshd[26794]: input_userauth_request: invalid user pi [preauth] Jan 14 19:15:48 host sshd[26794]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:15:48 host sshd[26794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.47.76.3 Jan 14 19:15:50 host sshd[26794]: Failed password for invalid user pi from 14.47.76.3 port 62697 ssh2 Jan 14 19:15:51 host sshd[26794]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:15:53 host sshd[26794]: Failed password for invalid user pi from 14.47.76.3 port 62697 ssh2 Jan 14 19:15:54 host sshd[26794]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:15:56 host sshd[26794]: Failed password for invalid user pi from 14.47.76.3 port 62697 ssh2 Jan 14 19:15:57 host sshd[26794]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:15:59 host sshd[26794]: Failed password for invalid user pi from 14.47.76.3 port 62697 ssh2 Jan 14 19:16:00 host sshd[26794]: Connection reset by 14.47.76.3 port 62697 [preauth] Jan 14 19:16:00 host sshd[26794]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.47.76.3 Jan 14 19:16:00 host sshd[26794]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 14 19:16:12 host sshd[26883]: Invalid user aclyde from 51.68.224.114 port 40840 Jan 14 19:16:12 host sshd[26883]: input_userauth_request: invalid user aclyde [preauth] Jan 14 19:16:12 host sshd[26883]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:16:12 host sshd[26883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.224.114 Jan 14 19:16:14 host sshd[26883]: Failed password for invalid user aclyde from 51.68.224.114 port 40840 ssh2 Jan 14 19:16:14 host sshd[26883]: Received disconnect from 51.68.224.114 port 40840:11: Bye Bye [preauth] Jan 14 19:16:14 host sshd[26883]: Disconnected from 51.68.224.114 port 40840 [preauth] Jan 14 19:16:26 host sshd[26915]: Invalid user galit from 213.230.120.17 port 49148 Jan 14 19:16:26 host sshd[26915]: input_userauth_request: invalid user galit [preauth] Jan 14 19:16:26 host sshd[26915]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:16:26 host sshd[26915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.120.17 Jan 14 19:16:28 host sshd[26915]: Failed password for invalid user galit from 213.230.120.17 port 49148 ssh2 Jan 14 19:16:28 host sshd[26915]: Received disconnect from 213.230.120.17 port 49148:11: Bye Bye [preauth] Jan 14 19:16:28 host sshd[26915]: Disconnected from 213.230.120.17 port 49148 [preauth] Jan 14 19:16:37 host sshd[26956]: Invalid user loulou from 139.59.23.154 port 44106 Jan 14 19:16:37 host sshd[26956]: input_userauth_request: invalid user loulou [preauth] Jan 14 19:16:37 host sshd[26956]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:16:37 host sshd[26956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.154 Jan 14 19:16:39 host sshd[26956]: Failed password for invalid user loulou from 139.59.23.154 port 44106 ssh2 Jan 14 19:16:39 host sshd[26956]: Received disconnect from 139.59.23.154 port 44106:11: Bye Bye [preauth] Jan 14 19:16:39 host sshd[26956]: Disconnected from 139.59.23.154 port 44106 [preauth] Jan 14 19:16:48 host sshd[26981]: Invalid user remote2_admin from 217.64.140.182 port 58134 Jan 14 19:16:48 host sshd[26981]: input_userauth_request: invalid user remote2_admin [preauth] Jan 14 19:16:48 host sshd[26981]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:16:48 host sshd[26981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.64.140.182 Jan 14 19:16:50 host sshd[26981]: Failed password for invalid user remote2_admin from 217.64.140.182 port 58134 ssh2 Jan 14 19:16:51 host sshd[26981]: Received disconnect from 217.64.140.182 port 58134:11: Bye Bye [preauth] Jan 14 19:16:51 host sshd[26981]: Disconnected from 217.64.140.182 port 58134 [preauth] Jan 14 19:16:54 host sshd[26993]: Invalid user chenxin from 185.227.153.190 port 40078 Jan 14 19:16:54 host sshd[26993]: input_userauth_request: invalid user chenxin [preauth] Jan 14 19:16:54 host sshd[26993]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:16:54 host sshd[26993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.227.153.190 Jan 14 19:16:56 host sshd[26993]: Failed password for invalid user chenxin from 185.227.153.190 port 40078 ssh2 Jan 14 19:16:56 host sshd[26993]: Received disconnect from 185.227.153.190 port 40078:11: Bye Bye [preauth] Jan 14 19:16:56 host sshd[26993]: Disconnected from 185.227.153.190 port 40078 [preauth] Jan 14 19:17:26 host sshd[27051]: Invalid user nishiwode from 51.68.224.114 port 37178 Jan 14 19:17:26 host sshd[27051]: input_userauth_request: invalid user nishiwode [preauth] Jan 14 19:17:26 host sshd[27051]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:17:26 host sshd[27051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.224.114 Jan 14 19:17:28 host sshd[27051]: Failed password for invalid user nishiwode from 51.68.224.114 port 37178 ssh2 Jan 14 19:17:28 host sshd[27051]: Received disconnect from 51.68.224.114 port 37178:11: Bye Bye [preauth] Jan 14 19:17:28 host sshd[27051]: Disconnected from 51.68.224.114 port 37178 [preauth] Jan 14 19:17:47 host sshd[27142]: Invalid user shiva from 213.230.120.17 port 38404 Jan 14 19:17:47 host sshd[27142]: input_userauth_request: invalid user shiva [preauth] Jan 14 19:17:47 host sshd[27142]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:17:47 host sshd[27142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.120.17 Jan 14 19:17:49 host sshd[27142]: Failed password for invalid user shiva from 213.230.120.17 port 38404 ssh2 Jan 14 19:17:51 host sshd[27181]: Invalid user zhanghui from 139.59.23.154 port 37614 Jan 14 19:17:51 host sshd[27181]: input_userauth_request: invalid user zhanghui [preauth] Jan 14 19:17:51 host sshd[27181]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:17:51 host sshd[27181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.154 Jan 14 19:17:53 host sshd[27181]: Failed password for invalid user zhanghui from 139.59.23.154 port 37614 ssh2 Jan 14 19:17:53 host sshd[27181]: Received disconnect from 139.59.23.154 port 37614:11: Bye Bye [preauth] Jan 14 19:17:53 host sshd[27181]: Disconnected from 139.59.23.154 port 37614 [preauth] Jan 14 19:18:00 host sshd[27228]: Invalid user rinima from 185.137.27.170 port 42508 Jan 14 19:18:00 host sshd[27228]: input_userauth_request: invalid user rinima [preauth] Jan 14 19:18:00 host sshd[27228]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:18:00 host sshd[27228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.170 Jan 14 19:18:02 host sshd[27228]: Failed password for invalid user rinima from 185.137.27.170 port 42508 ssh2 Jan 14 19:18:02 host sshd[27228]: Received disconnect from 185.137.27.170 port 42508:11: Bye Bye [preauth] Jan 14 19:18:02 host sshd[27228]: Disconnected from 185.137.27.170 port 42508 [preauth] Jan 14 19:18:04 host sshd[27251]: Invalid user nishiwode from 217.64.140.182 port 56632 Jan 14 19:18:04 host sshd[27251]: input_userauth_request: invalid user nishiwode [preauth] Jan 14 19:18:04 host sshd[27251]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:18:04 host sshd[27251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.64.140.182 Jan 14 19:18:05 host sshd[27251]: Failed password for invalid user nishiwode from 217.64.140.182 port 56632 ssh2 Jan 14 19:18:08 host sshd[27355]: Invalid user trumen from 77.37.248.144 port 43411 Jan 14 19:18:08 host sshd[27355]: input_userauth_request: invalid user trumen [preauth] Jan 14 19:18:08 host sshd[27355]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:18:08 host sshd[27355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.37.248.144 Jan 14 19:18:10 host sshd[27355]: Failed password for invalid user trumen from 77.37.248.144 port 43411 ssh2 Jan 14 19:18:10 host sshd[27355]: Received disconnect from 77.37.248.144 port 43411:11: Bye Bye [preauth] Jan 14 19:18:10 host sshd[27355]: Disconnected from 77.37.248.144 port 43411 [preauth] Jan 14 19:18:32 host sshd[27453]: Invalid user zouyong from 68.183.142.49 port 50004 Jan 14 19:18:32 host sshd[27453]: input_userauth_request: invalid user zouyong [preauth] Jan 14 19:18:32 host sshd[27453]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:18:32 host sshd[27453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.142.49 Jan 14 19:18:34 host sshd[27453]: Failed password for invalid user zouyong from 68.183.142.49 port 50004 ssh2 Jan 14 19:18:34 host sshd[27453]: Received disconnect from 68.183.142.49 port 50004:11: Bye Bye [preauth] Jan 14 19:18:34 host sshd[27453]: Disconnected from 68.183.142.49 port 50004 [preauth] Jan 14 19:18:37 host sshd[27461]: Invalid user taotao from 43.156.248.134 port 56540 Jan 14 19:18:37 host sshd[27461]: input_userauth_request: invalid user taotao [preauth] Jan 14 19:18:37 host sshd[27461]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:18:37 host sshd[27461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.248.134 Jan 14 19:18:39 host sshd[27461]: Failed password for invalid user taotao from 43.156.248.134 port 56540 ssh2 Jan 14 19:18:39 host sshd[27461]: Received disconnect from 43.156.248.134 port 56540:11: Bye Bye [preauth] Jan 14 19:18:39 host sshd[27461]: Disconnected from 43.156.248.134 port 56540 [preauth] Jan 14 19:18:43 host sshd[27469]: Invalid user uofklib from 122.117.51.33 port 54824 Jan 14 19:18:43 host sshd[27469]: input_userauth_request: invalid user uofklib [preauth] Jan 14 19:18:43 host sshd[27469]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:18:43 host sshd[27469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.51.33 Jan 14 19:18:44 host sshd[27469]: Failed password for invalid user uofklib from 122.117.51.33 port 54824 ssh2 Jan 14 19:18:44 host sshd[27469]: Received disconnect from 122.117.51.33 port 54824:11: Bye Bye [preauth] Jan 14 19:18:44 host sshd[27469]: Disconnected from 122.117.51.33 port 54824 [preauth] Jan 14 19:19:30 host sshd[27591]: Invalid user oooooo from 68.183.142.49 port 44344 Jan 14 19:19:30 host sshd[27591]: input_userauth_request: invalid user oooooo [preauth] Jan 14 19:19:30 host sshd[27591]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:19:30 host sshd[27591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.142.49 Jan 14 19:19:32 host sshd[27591]: Failed password for invalid user oooooo from 68.183.142.49 port 44344 ssh2 Jan 14 19:19:32 host sshd[27591]: Received disconnect from 68.183.142.49 port 44344:11: Bye Bye [preauth] Jan 14 19:19:32 host sshd[27591]: Disconnected from 68.183.142.49 port 44344 [preauth] Jan 14 19:19:33 host sshd[27564]: Invalid user cheatham from 185.227.153.190 port 58134 Jan 14 19:19:33 host sshd[27564]: input_userauth_request: invalid user cheatham [preauth] Jan 14 19:19:33 host sshd[27564]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:19:33 host sshd[27564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.227.153.190 Jan 14 19:19:35 host sshd[27564]: Failed password for invalid user cheatham from 185.227.153.190 port 58134 ssh2 Jan 14 19:19:36 host sshd[27564]: Received disconnect from 185.227.153.190 port 58134:11: Bye Bye [preauth] Jan 14 19:19:36 host sshd[27564]: Disconnected from 185.227.153.190 port 58134 [preauth] Jan 14 19:20:01 host sshd[27676]: Invalid user shiva from 122.117.51.33 port 53584 Jan 14 19:20:01 host sshd[27676]: input_userauth_request: invalid user shiva [preauth] Jan 14 19:20:01 host sshd[27676]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:20:01 host sshd[27676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.51.33 Jan 14 19:20:02 host sshd[27708]: Invalid user rinima from 58.230.203.182 port 55394 Jan 14 19:20:02 host sshd[27708]: input_userauth_request: invalid user rinima [preauth] Jan 14 19:20:02 host sshd[27708]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:20:02 host sshd[27708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.230.203.182 Jan 14 19:20:03 host sshd[27676]: Failed password for invalid user shiva from 122.117.51.33 port 53584 ssh2 Jan 14 19:20:03 host sshd[27676]: Received disconnect from 122.117.51.33 port 53584:11: Bye Bye [preauth] Jan 14 19:20:03 host sshd[27676]: Disconnected from 122.117.51.33 port 53584 [preauth] Jan 14 19:20:04 host sshd[27708]: Failed password for invalid user rinima from 58.230.203.182 port 55394 ssh2 Jan 14 19:20:05 host sshd[27708]: Received disconnect from 58.230.203.182 port 55394:11: Bye Bye [preauth] Jan 14 19:20:05 host sshd[27708]: Disconnected from 58.230.203.182 port 55394 [preauth] Jan 14 19:20:29 host sshd[27790]: Invalid user pcpqa from 104.248.51.246 port 46968 Jan 14 19:20:29 host sshd[27790]: input_userauth_request: invalid user pcpqa [preauth] Jan 14 19:20:29 host sshd[27790]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:20:29 host sshd[27790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.51.246 Jan 14 19:20:31 host sshd[27790]: Failed password for invalid user pcpqa from 104.248.51.246 port 46968 ssh2 Jan 14 19:20:31 host sshd[27790]: Received disconnect from 104.248.51.246 port 46968:11: Bye Bye [preauth] Jan 14 19:20:31 host sshd[27790]: Disconnected from 104.248.51.246 port 46968 [preauth] Jan 14 19:21:28 host sshd[27912]: Invalid user jiangfeng from 185.227.153.190 port 40454 Jan 14 19:21:28 host sshd[27912]: input_userauth_request: invalid user jiangfeng [preauth] Jan 14 19:21:28 host sshd[27912]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:21:28 host sshd[27912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.227.153.190 Jan 14 19:21:30 host sshd[27912]: Failed password for invalid user jiangfeng from 185.227.153.190 port 40454 ssh2 Jan 14 19:21:42 host sshd[27999]: Invalid user lowpriv from 104.248.51.246 port 34058 Jan 14 19:21:42 host sshd[27999]: input_userauth_request: invalid user lowpriv [preauth] Jan 14 19:21:42 host sshd[27999]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:21:42 host sshd[27999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.51.246 Jan 14 19:21:45 host sshd[27999]: Failed password for invalid user lowpriv from 104.248.51.246 port 34058 ssh2 Jan 14 19:21:45 host sshd[27999]: Received disconnect from 104.248.51.246 port 34058:11: Bye Bye [preauth] Jan 14 19:21:45 host sshd[27999]: Disconnected from 104.248.51.246 port 34058 [preauth] Jan 14 19:21:53 host sshd[28020]: Invalid user saottilie from 43.156.248.134 port 36320 Jan 14 19:21:53 host sshd[28020]: input_userauth_request: invalid user saottilie [preauth] Jan 14 19:21:53 host sshd[28020]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:21:53 host sshd[28020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.248.134 Jan 14 19:21:55 host sshd[28020]: Failed password for invalid user saottilie from 43.156.248.134 port 36320 ssh2 Jan 14 19:21:55 host sshd[28020]: Received disconnect from 43.156.248.134 port 36320:11: Bye Bye [preauth] Jan 14 19:21:55 host sshd[28020]: Disconnected from 43.156.248.134 port 36320 [preauth] Jan 14 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=wwwresourcehunte user-7=keralaholi user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=wwwnexidigital user-22=mrsclean user-23=palco123 user-24=gifterman user-25=kottayamcalldriv user-26=phmetals user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 19:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EnPVmOQeQAlqd3Im.~ Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EnPVmOQeQAlqd3Im.~' Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EnPVmOQeQAlqd3Im.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 19:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 19:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 19:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 19:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 19:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 19:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 19:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 19:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 19:22:07 host sshd[28196]: Invalid user zhangkai from 77.37.248.144 port 35707 Jan 14 19:22:07 host sshd[28196]: input_userauth_request: invalid user zhangkai [preauth] Jan 14 19:22:07 host sshd[28196]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:22:07 host sshd[28196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.37.248.144 Jan 14 19:22:09 host sshd[28196]: Failed password for invalid user zhangkai from 77.37.248.144 port 35707 ssh2 Jan 14 19:22:09 host sshd[28196]: Received disconnect from 77.37.248.144 port 35707:11: Bye Bye [preauth] Jan 14 19:22:09 host sshd[28196]: Disconnected from 77.37.248.144 port 35707 [preauth] Jan 14 19:22:17 host sshd[28277]: Invalid user woshini from 58.230.203.182 port 55498 Jan 14 19:22:17 host sshd[28277]: input_userauth_request: invalid user woshini [preauth] Jan 14 19:22:17 host sshd[28277]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:22:17 host sshd[28277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.230.203.182 Jan 14 19:22:19 host sshd[28277]: Failed password for invalid user woshini from 58.230.203.182 port 55498 ssh2 Jan 14 19:22:19 host sshd[28277]: Received disconnect from 58.230.203.182 port 55498:11: Bye Bye [preauth] Jan 14 19:22:19 host sshd[28277]: Disconnected from 58.230.203.182 port 55498 [preauth] Jan 14 19:22:22 host sshd[28296]: Invalid user wohenaini from 139.59.251.146 port 52288 Jan 14 19:22:22 host sshd[28296]: input_userauth_request: invalid user wohenaini [preauth] Jan 14 19:22:22 host sshd[28296]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:22:22 host sshd[28296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.251.146 Jan 14 19:22:24 host sshd[28296]: Failed password for invalid user wohenaini from 139.59.251.146 port 52288 ssh2 Jan 14 19:22:24 host sshd[28296]: Received disconnect from 139.59.251.146 port 52288:11: Bye Bye [preauth] Jan 14 19:22:24 host sshd[28296]: Disconnected from 139.59.251.146 port 52288 [preauth] Jan 14 19:22:25 host sshd[28300]: Invalid user zhangkai from 185.137.27.170 port 46948 Jan 14 19:22:25 host sshd[28300]: input_userauth_request: invalid user zhangkai [preauth] Jan 14 19:22:25 host sshd[28300]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:22:25 host sshd[28300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.170 Jan 14 19:22:27 host sshd[28300]: Failed password for invalid user zhangkai from 185.137.27.170 port 46948 ssh2 Jan 14 19:22:27 host sshd[28300]: Received disconnect from 185.137.27.170 port 46948:11: Bye Bye [preauth] Jan 14 19:22:27 host sshd[28300]: Disconnected from 185.137.27.170 port 46948 [preauth] Jan 14 19:22:36 host sshd[28337]: Invalid user zhangshulan from 175.196.245.105 port 58498 Jan 14 19:22:36 host sshd[28337]: input_userauth_request: invalid user zhangshulan [preauth] Jan 14 19:22:37 host sshd[28337]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:22:37 host sshd[28337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.245.105 Jan 14 19:22:39 host sshd[28337]: Failed password for invalid user zhangshulan from 175.196.245.105 port 58498 ssh2 Jan 14 19:22:39 host sshd[28337]: Received disconnect from 175.196.245.105 port 58498:11: Bye Bye [preauth] Jan 14 19:22:39 host sshd[28337]: Disconnected from 175.196.245.105 port 58498 [preauth] Jan 14 19:22:49 host sshd[28363]: Invalid user xiaohui from 104.248.51.246 port 47194 Jan 14 19:22:49 host sshd[28363]: input_userauth_request: invalid user xiaohui [preauth] Jan 14 19:22:49 host sshd[28363]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:22:49 host sshd[28363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.51.246 Jan 14 19:22:51 host sshd[28363]: Failed password for invalid user xiaohui from 104.248.51.246 port 47194 ssh2 Jan 14 19:23:08 host sshd[28431]: Invalid user jiaojiao from 43.156.248.134 port 59540 Jan 14 19:23:08 host sshd[28431]: input_userauth_request: invalid user jiaojiao [preauth] Jan 14 19:23:08 host sshd[28431]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:23:08 host sshd[28431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.248.134 Jan 14 19:23:10 host sshd[28431]: Failed password for invalid user jiaojiao from 43.156.248.134 port 59540 ssh2 Jan 14 19:23:17 host sshd[28575]: Invalid user taotao from 77.37.248.144 port 46873 Jan 14 19:23:17 host sshd[28575]: input_userauth_request: invalid user taotao [preauth] Jan 14 19:23:17 host sshd[28575]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:23:17 host sshd[28575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.37.248.144 Jan 14 19:23:20 host sshd[28575]: Failed password for invalid user taotao from 77.37.248.144 port 46873 ssh2 Jan 14 19:23:20 host sshd[28575]: Received disconnect from 77.37.248.144 port 46873:11: Bye Bye [preauth] Jan 14 19:23:20 host sshd[28575]: Disconnected from 77.37.248.144 port 46873 [preauth] Jan 14 19:23:29 host sshd[28643]: Invalid user terrariaserver from 58.230.203.182 port 55586 Jan 14 19:23:29 host sshd[28643]: input_userauth_request: invalid user terrariaserver [preauth] Jan 14 19:23:29 host sshd[28643]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:23:29 host sshd[28643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.230.203.182 Jan 14 19:23:32 host sshd[28643]: Failed password for invalid user terrariaserver from 58.230.203.182 port 55586 ssh2 Jan 14 19:23:44 host sshd[28691]: Invalid user trumen from 185.137.27.170 port 47932 Jan 14 19:23:44 host sshd[28691]: input_userauth_request: invalid user trumen [preauth] Jan 14 19:23:44 host sshd[28691]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:23:44 host sshd[28691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.170 Jan 14 19:23:46 host sshd[28691]: Failed password for invalid user trumen from 185.137.27.170 port 47932 ssh2 Jan 14 19:23:46 host sshd[28691]: Received disconnect from 185.137.27.170 port 47932:11: Bye Bye [preauth] Jan 14 19:23:46 host sshd[28691]: Disconnected from 185.137.27.170 port 47932 [preauth] Jan 14 19:23:55 host sshd[28745]: Invalid user zhanghaomima from 103.186.0.207 port 45654 Jan 14 19:23:55 host sshd[28745]: input_userauth_request: invalid user zhanghaomima [preauth] Jan 14 19:23:55 host sshd[28745]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:23:55 host sshd[28745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.186.0.207 Jan 14 19:23:58 host sshd[28745]: Failed password for invalid user zhanghaomima from 103.186.0.207 port 45654 ssh2 Jan 14 19:23:58 host sshd[28745]: Received disconnect from 103.186.0.207 port 45654:11: Bye Bye [preauth] Jan 14 19:23:58 host sshd[28745]: Disconnected from 103.186.0.207 port 45654 [preauth] Jan 14 19:24:06 host sshd[28767]: Invalid user jiangjun from 175.196.245.105 port 48652 Jan 14 19:24:06 host sshd[28767]: input_userauth_request: invalid user jiangjun [preauth] Jan 14 19:24:06 host sshd[28767]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:24:06 host sshd[28767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.245.105 Jan 14 19:24:08 host sshd[28767]: Failed password for invalid user jiangjun from 175.196.245.105 port 48652 ssh2 Jan 14 19:24:08 host sshd[28767]: Received disconnect from 175.196.245.105 port 48652:11: Bye Bye [preauth] Jan 14 19:24:08 host sshd[28767]: Disconnected from 175.196.245.105 port 48652 [preauth] Jan 14 19:27:54 host sshd[29206]: Invalid user user7 from 103.186.0.207 port 44204 Jan 14 19:27:54 host sshd[29206]: input_userauth_request: invalid user user7 [preauth] Jan 14 19:27:54 host sshd[29206]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:27:54 host sshd[29206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.186.0.207 Jan 14 19:27:56 host sshd[29206]: Failed password for invalid user user7 from 103.186.0.207 port 44204 ssh2 Jan 14 19:27:56 host sshd[29206]: Received disconnect from 103.186.0.207 port 44204:11: Bye Bye [preauth] Jan 14 19:27:56 host sshd[29206]: Disconnected from 103.186.0.207 port 44204 [preauth] Jan 14 19:28:51 host sshd[29440]: Invalid user heleilei from 139.59.251.146 port 48596 Jan 14 19:28:51 host sshd[29440]: input_userauth_request: invalid user heleilei [preauth] Jan 14 19:28:51 host sshd[29440]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:28:51 host sshd[29440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.251.146 Jan 14 19:28:53 host sshd[29440]: Failed password for invalid user heleilei from 139.59.251.146 port 48596 ssh2 Jan 14 19:28:53 host sshd[29440]: Received disconnect from 139.59.251.146 port 48596:11: Bye Bye [preauth] Jan 14 19:28:53 host sshd[29440]: Disconnected from 139.59.251.146 port 48596 [preauth] Jan 14 19:29:23 host sshd[29499]: Invalid user heleilei from 103.186.0.207 port 60134 Jan 14 19:29:23 host sshd[29499]: input_userauth_request: invalid user heleilei [preauth] Jan 14 19:29:23 host sshd[29499]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:29:23 host sshd[29499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.186.0.207 Jan 14 19:29:25 host sshd[29499]: Failed password for invalid user heleilei from 103.186.0.207 port 60134 ssh2 Jan 14 19:30:12 host sshd[29629]: Invalid user leilei from 139.59.251.146 port 42928 Jan 14 19:30:12 host sshd[29629]: input_userauth_request: invalid user leilei [preauth] Jan 14 19:30:12 host sshd[29629]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:30:12 host sshd[29629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.251.146 Jan 14 19:30:14 host sshd[29629]: Failed password for invalid user leilei from 139.59.251.146 port 42928 ssh2 Jan 14 19:30:14 host sshd[29629]: Received disconnect from 139.59.251.146 port 42928:11: Bye Bye [preauth] Jan 14 19:30:14 host sshd[29629]: Disconnected from 139.59.251.146 port 42928 [preauth] Jan 14 19:33:35 host sshd[30033]: User root from 143.244.142.12 not allowed because not listed in AllowUsers Jan 14 19:33:35 host sshd[30033]: input_userauth_request: invalid user root [preauth] Jan 14 19:33:35 host unix_chkpwd[30035]: password check failed for user (root) Jan 14 19:33:35 host sshd[30033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.142.12 user=root Jan 14 19:33:35 host sshd[30033]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 19:33:37 host sshd[30033]: Failed password for invalid user root from 143.244.142.12 port 38236 ssh2 Jan 14 19:33:37 host unix_chkpwd[30037]: password check failed for user (root) Jan 14 19:33:37 host sshd[30033]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 19:33:39 host sshd[30033]: Failed password for invalid user root from 143.244.142.12 port 38236 ssh2 Jan 14 19:33:39 host unix_chkpwd[30040]: password check failed for user (root) Jan 14 19:33:39 host sshd[30033]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 19:33:42 host sshd[30033]: Failed password for invalid user root from 143.244.142.12 port 38236 ssh2 Jan 14 19:33:42 host unix_chkpwd[30043]: password check failed for user (root) Jan 14 19:33:42 host sshd[30033]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 19:33:44 host sshd[30033]: Failed password for invalid user root from 143.244.142.12 port 38236 ssh2 Jan 14 19:33:44 host unix_chkpwd[30046]: password check failed for user (root) Jan 14 19:33:44 host sshd[30033]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 19:33:46 host sshd[30033]: Failed password for invalid user root from 143.244.142.12 port 38236 ssh2 Jan 14 19:33:51 host sshd[30194]: Invalid user user from 202.39.151.71 port 44080 Jan 14 19:33:51 host sshd[30194]: input_userauth_request: invalid user user [preauth] Jan 14 19:33:51 host sshd[30194]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:33:51 host sshd[30194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.151.71 Jan 14 19:33:54 host sshd[30194]: Failed password for invalid user user from 202.39.151.71 port 44080 ssh2 Jan 14 19:33:54 host sshd[30194]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:33:56 host sshd[30194]: Failed password for invalid user user from 202.39.151.71 port 44080 ssh2 Jan 14 19:33:56 host sshd[30194]: Connection reset by 202.39.151.71 port 44080 [preauth] Jan 14 19:33:56 host sshd[30194]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.151.71 Jan 14 19:36:44 host sshd[30528]: Invalid user pi from 211.20.7.165 port 53611 Jan 14 19:36:44 host sshd[30528]: input_userauth_request: invalid user pi [preauth] Jan 14 19:36:44 host sshd[30528]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:36:44 host sshd[30528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.20.7.165 Jan 14 19:36:47 host sshd[30528]: Failed password for invalid user pi from 211.20.7.165 port 53611 ssh2 Jan 14 19:36:47 host sshd[30528]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:36:49 host sshd[30528]: Failed password for invalid user pi from 211.20.7.165 port 53611 ssh2 Jan 14 19:36:49 host sshd[30528]: Connection reset by 211.20.7.165 port 53611 [preauth] Jan 14 19:36:49 host sshd[30528]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.20.7.165 Jan 14 19:44:52 host sshd[31658]: Connection reset by 121.158.89.62 port 53235 [preauth] Jan 14 19:45:22 host sshd[31749]: Invalid user admin from 116.42.203.93 port 63698 Jan 14 19:45:22 host sshd[31749]: input_userauth_request: invalid user admin [preauth] Jan 14 19:45:22 host sshd[31749]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:45:22 host sshd[31749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.42.203.93 Jan 14 19:45:23 host sshd[31749]: Failed password for invalid user admin from 116.42.203.93 port 63698 ssh2 Jan 14 19:45:25 host sshd[31749]: Connection reset by 116.42.203.93 port 63698 [preauth] Jan 14 19:51:27 host sshd[453]: Connection reset by 114.32.195.198 port 51144 [preauth] Jan 14 19:54:19 host sshd[790]: Invalid user admin from 125.130.226.82 port 50020 Jan 14 19:54:19 host sshd[790]: input_userauth_request: invalid user admin [preauth] Jan 14 19:54:19 host sshd[790]: pam_unix(sshd:auth): check pass; user unknown Jan 14 19:54:19 host sshd[790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.226.82 Jan 14 19:54:21 host sshd[790]: Failed password for invalid user admin from 125.130.226.82 port 50020 ssh2 Jan 14 19:54:22 host sshd[790]: Connection reset by 125.130.226.82 port 50020 [preauth] Jan 14 20:01:38 host sshd[1839]: Invalid user postgres from 43.243.215.243 port 49359 Jan 14 20:01:38 host sshd[1839]: input_userauth_request: invalid user postgres [preauth] Jan 14 20:01:38 host sshd[1839]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:01:38 host sshd[1839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.215.243 Jan 14 20:01:40 host sshd[1839]: Failed password for invalid user postgres from 43.243.215.243 port 49359 ssh2 Jan 14 20:01:40 host sshd[1839]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:01:43 host sshd[1839]: Failed password for invalid user postgres from 43.243.215.243 port 49359 ssh2 Jan 14 20:01:43 host sshd[1839]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:01:45 host sshd[1839]: Failed password for invalid user postgres from 43.243.215.243 port 49359 ssh2 Jan 14 20:01:46 host sshd[1839]: Failed password for invalid user postgres from 43.243.215.243 port 49359 ssh2 Jan 14 20:01:46 host sshd[1839]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:01:48 host sshd[1839]: Failed password for invalid user postgres from 43.243.215.243 port 49359 ssh2 Jan 14 20:01:48 host sshd[1839]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:01:50 host sshd[1839]: Failed password for invalid user postgres from 43.243.215.243 port 49359 ssh2 Jan 14 20:01:50 host sshd[1839]: error: maximum authentication attempts exceeded for invalid user postgres from 43.243.215.243 port 49359 ssh2 [preauth] Jan 14 20:01:50 host sshd[1839]: Disconnecting: Too many authentication failures [preauth] Jan 14 20:01:50 host sshd[1839]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.215.243 Jan 14 20:01:50 host sshd[1839]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 14 20:03:23 host sshd[2053]: Invalid user default from 218.35.169.102 port 49450 Jan 14 20:03:23 host sshd[2053]: input_userauth_request: invalid user default [preauth] Jan 14 20:03:23 host sshd[2053]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:03:23 host sshd[2053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.35.169.102 Jan 14 20:03:25 host sshd[2053]: Failed password for invalid user default from 218.35.169.102 port 49450 ssh2 Jan 14 20:03:25 host sshd[2053]: Connection reset by 218.35.169.102 port 49450 [preauth] Jan 14 20:08:10 host sshd[2677]: Invalid user vadmin from 2.235.184.98 port 58761 Jan 14 20:08:10 host sshd[2677]: input_userauth_request: invalid user vadmin [preauth] Jan 14 20:08:10 host sshd[2677]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:08:10 host sshd[2677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.235.184.98 Jan 14 20:08:12 host sshd[2677]: Failed password for invalid user vadmin from 2.235.184.98 port 58761 ssh2 Jan 14 20:08:14 host sshd[2677]: Connection reset by 2.235.184.98 port 58761 [preauth] Jan 14 20:17:36 host sshd[3932]: Invalid user woaini from 112.198.43.130 port 42787 Jan 14 20:17:36 host sshd[3932]: input_userauth_request: invalid user woaini [preauth] Jan 14 20:17:36 host sshd[3932]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:17:36 host sshd[3932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.43.130 Jan 14 20:17:38 host sshd[3932]: Failed password for invalid user woaini from 112.198.43.130 port 42787 ssh2 Jan 14 20:17:38 host sshd[3932]: Received disconnect from 112.198.43.130 port 42787:11: Bye Bye [preauth] Jan 14 20:17:38 host sshd[3932]: Disconnected from 112.198.43.130 port 42787 [preauth] Jan 14 20:20:47 host sshd[4278]: Invalid user liuyu from 112.198.43.130 port 44935 Jan 14 20:20:47 host sshd[4278]: input_userauth_request: invalid user liuyu [preauth] Jan 14 20:20:47 host sshd[4278]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:20:47 host sshd[4278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.43.130 Jan 14 20:20:49 host sshd[4278]: Failed password for invalid user liuyu from 112.198.43.130 port 44935 ssh2 Jan 14 20:20:49 host sshd[4278]: Received disconnect from 112.198.43.130 port 44935:11: Bye Bye [preauth] Jan 14 20:20:49 host sshd[4278]: Disconnected from 112.198.43.130 port 44935 [preauth] Jan 14 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=kottayamcalldriv user-4=phmetals user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=straightcurve user-10=wwwletsstalkfood user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 20:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Uj2FLmOEsFvsphVA.~ Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Uj2FLmOEsFvsphVA.~' Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Uj2FLmOEsFvsphVA.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 20:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 20:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 20:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 20:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 20:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 20:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 20:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 20:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 20:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 20:22:13 host sshd[4701]: Invalid user erhan from 112.198.43.130 port 56118 Jan 14 20:22:13 host sshd[4701]: input_userauth_request: invalid user erhan [preauth] Jan 14 20:22:13 host sshd[4701]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:22:13 host sshd[4701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.43.130 Jan 14 20:22:15 host sshd[4701]: Failed password for invalid user erhan from 112.198.43.130 port 56118 ssh2 Jan 14 20:22:15 host sshd[4701]: Received disconnect from 112.198.43.130 port 56118:11: Bye Bye [preauth] Jan 14 20:22:15 host sshd[4701]: Disconnected from 112.198.43.130 port 56118 [preauth] Jan 14 20:27:12 host sshd[5400]: Invalid user telnet from 183.103.220.50 port 62854 Jan 14 20:27:12 host sshd[5400]: input_userauth_request: invalid user telnet [preauth] Jan 14 20:27:12 host sshd[5400]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:27:12 host sshd[5400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.103.220.50 Jan 14 20:27:15 host sshd[5400]: Failed password for invalid user telnet from 183.103.220.50 port 62854 ssh2 Jan 14 20:27:15 host sshd[5400]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:27:17 host sshd[5400]: Failed password for invalid user telnet from 183.103.220.50 port 62854 ssh2 Jan 14 20:27:18 host sshd[5400]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:27:20 host sshd[5400]: Failed password for invalid user telnet from 183.103.220.50 port 62854 ssh2 Jan 14 20:27:21 host sshd[5400]: Failed password for invalid user telnet from 183.103.220.50 port 62854 ssh2 Jan 14 20:27:22 host sshd[5400]: Connection reset by 183.103.220.50 port 62854 [preauth] Jan 14 20:27:22 host sshd[5400]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.103.220.50 Jan 14 20:28:54 host sshd[5600]: User root from 59.6.79.235 not allowed because not listed in AllowUsers Jan 14 20:28:54 host sshd[5600]: input_userauth_request: invalid user root [preauth] Jan 14 20:28:54 host unix_chkpwd[5603]: password check failed for user (root) Jan 14 20:28:54 host sshd[5600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.6.79.235 user=root Jan 14 20:28:54 host sshd[5600]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 20:28:56 host sshd[5600]: Failed password for invalid user root from 59.6.79.235 port 62353 ssh2 Jan 14 20:28:57 host unix_chkpwd[5606]: password check failed for user (root) Jan 14 20:28:57 host sshd[5600]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 20:28:59 host sshd[5600]: Failed password for invalid user root from 59.6.79.235 port 62353 ssh2 Jan 14 20:29:00 host unix_chkpwd[5609]: password check failed for user (root) Jan 14 20:29:00 host sshd[5600]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 20:29:01 host sshd[5600]: Failed password for invalid user root from 59.6.79.235 port 62353 ssh2 Jan 14 20:29:02 host unix_chkpwd[5627]: password check failed for user (root) Jan 14 20:29:02 host sshd[5600]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 20:29:04 host sshd[5600]: Failed password for invalid user root from 59.6.79.235 port 62353 ssh2 Jan 14 20:29:05 host unix_chkpwd[5635]: password check failed for user (root) Jan 14 20:29:05 host sshd[5600]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 20:29:06 host sshd[5600]: Failed password for invalid user root from 59.6.79.235 port 62353 ssh2 Jan 14 20:32:21 host sshd[6034]: Invalid user admin from 59.27.90.168 port 41120 Jan 14 20:32:21 host sshd[6034]: input_userauth_request: invalid user admin [preauth] Jan 14 20:32:21 host sshd[6034]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:32:21 host sshd[6034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.27.90.168 Jan 14 20:32:24 host sshd[6034]: Failed password for invalid user admin from 59.27.90.168 port 41120 ssh2 Jan 14 20:33:35 host sshd[6186]: User root from 141.98.11.151 not allowed because not listed in AllowUsers Jan 14 20:33:35 host sshd[6186]: input_userauth_request: invalid user root [preauth] Jan 14 20:33:35 host unix_chkpwd[6189]: password check failed for user (root) Jan 14 20:33:35 host sshd[6186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.151 user=root Jan 14 20:33:35 host sshd[6186]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 20:33:36 host sshd[6186]: Failed password for invalid user root from 141.98.11.151 port 51494 ssh2 Jan 14 20:33:37 host sshd[6186]: Received disconnect from 141.98.11.151 port 51494:11: Normal Shutdown, Thank you for playing [preauth] Jan 14 20:33:37 host sshd[6186]: Disconnected from 141.98.11.151 port 51494 [preauth] Jan 14 20:39:54 host sshd[7082]: User root from 141.98.11.151 not allowed because not listed in AllowUsers Jan 14 20:39:54 host sshd[7082]: input_userauth_request: invalid user root [preauth] Jan 14 20:39:54 host unix_chkpwd[7085]: password check failed for user (root) Jan 14 20:39:54 host sshd[7082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.151 user=root Jan 14 20:39:54 host sshd[7082]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 20:39:56 host sshd[7082]: Failed password for invalid user root from 141.98.11.151 port 38538 ssh2 Jan 14 20:39:56 host sshd[7082]: Received disconnect from 141.98.11.151 port 38538:11: Normal Shutdown, Thank you for playing [preauth] Jan 14 20:39:56 host sshd[7082]: Disconnected from 141.98.11.151 port 38538 [preauth] Jan 14 20:42:07 host sshd[7342]: Connection reset by 121.191.47.106 port 63185 [preauth] Jan 14 20:47:09 host sshd[8037]: User root from 220.70.205.49 not allowed because not listed in AllowUsers Jan 14 20:47:09 host sshd[8037]: input_userauth_request: invalid user root [preauth] Jan 14 20:47:09 host unix_chkpwd[8044]: password check failed for user (root) Jan 14 20:47:09 host sshd[8037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.70.205.49 user=root Jan 14 20:47:09 host sshd[8037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 20:47:11 host sshd[8037]: Failed password for invalid user root from 220.70.205.49 port 60185 ssh2 Jan 14 20:47:12 host unix_chkpwd[8048]: password check failed for user (root) Jan 14 20:47:12 host sshd[8037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 20:47:14 host sshd[8037]: Failed password for invalid user root from 220.70.205.49 port 60185 ssh2 Jan 14 20:47:18 host unix_chkpwd[8062]: password check failed for user (root) Jan 14 20:47:18 host sshd[8037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 20:47:20 host sshd[8037]: Failed password for invalid user root from 220.70.205.49 port 60185 ssh2 Jan 14 20:47:22 host unix_chkpwd[8071]: password check failed for user (root) Jan 14 20:47:22 host sshd[8037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 20:47:24 host sshd[8037]: Failed password for invalid user root from 220.70.205.49 port 60185 ssh2 Jan 14 20:48:51 host sshd[8249]: Invalid user eb from 194.110.203.109 port 43434 Jan 14 20:48:51 host sshd[8249]: input_userauth_request: invalid user eb [preauth] Jan 14 20:48:51 host sshd[8249]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:48:51 host sshd[8249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 20:48:52 host sshd[8249]: Failed password for invalid user eb from 194.110.203.109 port 43434 ssh2 Jan 14 20:48:55 host sshd[8249]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:48:57 host sshd[8249]: Failed password for invalid user eb from 194.110.203.109 port 43434 ssh2 Jan 14 20:49:00 host sshd[8249]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:49:02 host sshd[8249]: Failed password for invalid user eb from 194.110.203.109 port 43434 ssh2 Jan 14 20:49:06 host sshd[8249]: Connection closed by 194.110.203.109 port 43434 [preauth] Jan 14 20:49:06 host sshd[8249]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 20:50:24 host sshd[8504]: Did not receive identification string from 104.152.52.139 port 49423 Jan 14 20:51:38 host sshd[8690]: Invalid user zyfwp from 123.241.11.244 port 48750 Jan 14 20:51:38 host sshd[8690]: input_userauth_request: invalid user zyfwp [preauth] Jan 14 20:51:38 host sshd[8690]: pam_unix(sshd:auth): check pass; user unknown Jan 14 20:51:38 host sshd[8690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.241.11.244 Jan 14 20:51:40 host sshd[8690]: Failed password for invalid user zyfwp from 123.241.11.244 port 48750 ssh2 Jan 14 20:51:41 host sshd[8690]: Connection reset by 123.241.11.244 port 48750 [preauth] Jan 14 21:08:25 host sshd[11072]: Invalid user chavosh from 54.36.5.242 port 55012 Jan 14 21:08:25 host sshd[11072]: input_userauth_request: invalid user chavosh [preauth] Jan 14 21:08:25 host sshd[11072]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:08:25 host sshd[11072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.5.242 Jan 14 21:08:27 host sshd[11072]: Failed password for invalid user chavosh from 54.36.5.242 port 55012 ssh2 Jan 14 21:08:27 host sshd[11072]: Received disconnect from 54.36.5.242 port 55012:11: Bye Bye [preauth] Jan 14 21:08:27 host sshd[11072]: Disconnected from 54.36.5.242 port 55012 [preauth] Jan 14 21:10:04 host sshd[11283]: Invalid user haodajiang from 101.178.223.39 port 54624 Jan 14 21:10:04 host sshd[11283]: input_userauth_request: invalid user haodajiang [preauth] Jan 14 21:10:04 host sshd[11283]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:10:04 host sshd[11283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.178.223.39 Jan 14 21:10:06 host sshd[11283]: Failed password for invalid user haodajiang from 101.178.223.39 port 54624 ssh2 Jan 14 21:10:06 host sshd[11283]: Received disconnect from 101.178.223.39 port 54624:11: Bye Bye [preauth] Jan 14 21:10:06 host sshd[11283]: Disconnected from 101.178.223.39 port 54624 [preauth] Jan 14 21:13:29 host sshd[11768]: Invalid user huizhang from 89.17.63.85 port 44723 Jan 14 21:13:29 host sshd[11768]: input_userauth_request: invalid user huizhang [preauth] Jan 14 21:13:29 host sshd[11768]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:13:29 host sshd[11768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.17.63.85 Jan 14 21:13:31 host sshd[11768]: Failed password for invalid user huizhang from 89.17.63.85 port 44723 ssh2 Jan 14 21:13:31 host sshd[11768]: Received disconnect from 89.17.63.85 port 44723:11: Bye Bye [preauth] Jan 14 21:13:31 host sshd[11768]: Disconnected from 89.17.63.85 port 44723 [preauth] Jan 14 21:14:41 host sshd[11912]: Invalid user aiziji from 101.178.223.39 port 43504 Jan 14 21:14:41 host sshd[11912]: input_userauth_request: invalid user aiziji [preauth] Jan 14 21:14:41 host sshd[11912]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:14:41 host sshd[11912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.178.223.39 Jan 14 21:14:43 host sshd[11912]: Failed password for invalid user aiziji from 101.178.223.39 port 43504 ssh2 Jan 14 21:14:43 host sshd[11912]: Received disconnect from 101.178.223.39 port 43504:11: Bye Bye [preauth] Jan 14 21:14:43 host sshd[11912]: Disconnected from 101.178.223.39 port 43504 [preauth] Jan 14 21:15:37 host sshd[12037]: Invalid user liguirong from 89.17.63.85 port 42818 Jan 14 21:15:37 host sshd[12037]: input_userauth_request: invalid user liguirong [preauth] Jan 14 21:15:37 host sshd[12037]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:15:37 host sshd[12037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.17.63.85 Jan 14 21:15:39 host sshd[12037]: Failed password for invalid user liguirong from 89.17.63.85 port 42818 ssh2 Jan 14 21:15:39 host sshd[12037]: Received disconnect from 89.17.63.85 port 42818:11: Bye Bye [preauth] Jan 14 21:15:39 host sshd[12037]: Disconnected from 89.17.63.85 port 42818 [preauth] Jan 14 21:16:21 host sshd[12123]: Invalid user zhanghui from 101.178.223.39 port 42326 Jan 14 21:16:21 host sshd[12123]: input_userauth_request: invalid user zhanghui [preauth] Jan 14 21:16:21 host sshd[12123]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:16:21 host sshd[12123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.178.223.39 Jan 14 21:16:24 host sshd[12123]: Failed password for invalid user zhanghui from 101.178.223.39 port 42326 ssh2 Jan 14 21:17:07 host sshd[12252]: Invalid user chavosh from 89.17.63.85 port 35770 Jan 14 21:17:07 host sshd[12252]: input_userauth_request: invalid user chavosh [preauth] Jan 14 21:17:07 host sshd[12252]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:17:07 host sshd[12252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.17.63.85 Jan 14 21:17:09 host sshd[12252]: Failed password for invalid user chavosh from 89.17.63.85 port 35770 ssh2 Jan 14 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 21:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 21:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 21:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 21:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 21:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZX8aoCqzopCs0MOk.~ Jan 14 21:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZX8aoCqzopCs0MOk.~' Jan 14 21:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZX8aoCqzopCs0MOk.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 21:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 21:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 21:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 21:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 21:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 21:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 21:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 21:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 21:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 21:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 21:23:06 host sshd[13345]: User root from 123.205.5.41 not allowed because not listed in AllowUsers Jan 14 21:23:06 host sshd[13345]: input_userauth_request: invalid user root [preauth] Jan 14 21:23:07 host unix_chkpwd[13349]: password check failed for user (root) Jan 14 21:23:07 host sshd[13345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.205.5.41 user=root Jan 14 21:23:07 host sshd[13345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 21:23:09 host sshd[13345]: Failed password for invalid user root from 123.205.5.41 port 53879 ssh2 Jan 14 21:23:09 host unix_chkpwd[13354]: password check failed for user (root) Jan 14 21:23:09 host sshd[13345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 21:23:11 host sshd[13345]: Failed password for invalid user root from 123.205.5.41 port 53879 ssh2 Jan 14 21:23:12 host sshd[13345]: Connection reset by 123.205.5.41 port 53879 [preauth] Jan 14 21:23:12 host sshd[13345]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.205.5.41 user=root Jan 14 21:34:14 host sshd[14956]: Invalid user chenwei from 54.36.5.242 port 55844 Jan 14 21:34:14 host sshd[14956]: input_userauth_request: invalid user chenwei [preauth] Jan 14 21:34:14 host sshd[14956]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:34:14 host sshd[14956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.5.242 Jan 14 21:34:16 host sshd[14956]: Failed password for invalid user chenwei from 54.36.5.242 port 55844 ssh2 Jan 14 21:34:16 host sshd[14956]: Received disconnect from 54.36.5.242 port 55844:11: Bye Bye [preauth] Jan 14 21:34:16 host sshd[14956]: Disconnected from 54.36.5.242 port 55844 [preauth] Jan 14 21:39:55 host sshd[15592]: Invalid user anthony from 54.36.5.242 port 56030 Jan 14 21:39:55 host sshd[15592]: input_userauth_request: invalid user anthony [preauth] Jan 14 21:39:55 host sshd[15592]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:39:55 host sshd[15592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.5.242 Jan 14 21:39:57 host sshd[15592]: Failed password for invalid user anthony from 54.36.5.242 port 56030 ssh2 Jan 14 21:39:57 host sshd[15592]: Received disconnect from 54.36.5.242 port 56030:11: Bye Bye [preauth] Jan 14 21:39:57 host sshd[15592]: Disconnected from 54.36.5.242 port 56030 [preauth] Jan 14 21:50:18 host sshd[17098]: Did not receive identification string from 13.76.164.123 port 48934 Jan 14 21:50:19 host sshd[17101]: Invalid user ubuntu from 13.76.164.123 port 50456 Jan 14 21:50:19 host sshd[17101]: input_userauth_request: invalid user ubuntu [preauth] Jan 14 21:50:19 host sshd[17099]: Invalid user ftpuser from 13.76.164.123 port 50452 Jan 14 21:50:19 host sshd[17099]: input_userauth_request: invalid user ftpuser [preauth] Jan 14 21:50:19 host sshd[17100]: Invalid user git from 13.76.164.123 port 50482 Jan 14 21:50:19 host sshd[17100]: input_userauth_request: invalid user git [preauth] Jan 14 21:50:19 host sshd[17104]: Invalid user pi from 13.76.164.123 port 50426 Jan 14 21:50:19 host sshd[17104]: input_userauth_request: invalid user pi [preauth] Jan 14 21:50:19 host sshd[17102]: User root from 13.76.164.123 not allowed because not listed in AllowUsers Jan 14 21:50:19 host sshd[17106]: User root from 13.76.164.123 not allowed because not listed in AllowUsers Jan 14 21:50:19 host sshd[17106]: input_userauth_request: invalid user root [preauth] Jan 14 21:50:19 host sshd[17102]: input_userauth_request: invalid user root [preauth] Jan 14 21:50:19 host sshd[17105]: User root from 13.76.164.123 not allowed because not listed in AllowUsers Jan 14 21:50:19 host sshd[17105]: input_userauth_request: invalid user root [preauth] Jan 14 21:50:19 host sshd[17109]: Invalid user pi from 13.76.164.123 port 50432 Jan 14 21:50:19 host sshd[17109]: input_userauth_request: invalid user pi [preauth] Jan 14 21:50:19 host sshd[17103]: User root from 13.76.164.123 not allowed because not listed in AllowUsers Jan 14 21:50:19 host sshd[17103]: input_userauth_request: invalid user root [preauth] Jan 14 21:50:19 host sshd[17108]: Invalid user ansible from 13.76.164.123 port 50418 Jan 14 21:50:19 host sshd[17108]: input_userauth_request: invalid user ansible [preauth] Jan 14 21:50:19 host sshd[17107]: Invalid user postgres from 13.76.164.123 port 50464 Jan 14 21:50:19 host sshd[17107]: input_userauth_request: invalid user postgres [preauth] Jan 14 21:50:19 host sshd[17110]: Invalid user steam from 13.76.164.123 port 50442 Jan 14 21:50:19 host sshd[17110]: input_userauth_request: invalid user steam [preauth] Jan 14 21:50:19 host sshd[17099]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:50:19 host sshd[17101]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:50:19 host sshd[17101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 Jan 14 21:50:19 host sshd[17099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 Jan 14 21:50:19 host sshd[17100]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:50:19 host sshd[17100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 Jan 14 21:50:19 host sshd[17104]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:50:19 host sshd[17104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 Jan 14 21:50:19 host sshd[17107]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:50:19 host sshd[17107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 Jan 14 21:50:19 host sshd[17110]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:50:19 host sshd[17110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 Jan 14 21:50:19 host sshd[17108]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:50:19 host sshd[17108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 Jan 14 21:50:19 host sshd[17109]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:50:19 host sshd[17109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 Jan 14 21:50:19 host unix_chkpwd[17123]: password check failed for user (root) Jan 14 21:50:19 host unix_chkpwd[17125]: password check failed for user (root) Jan 14 21:50:19 host sshd[17105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 user=root Jan 14 21:50:19 host sshd[17105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 21:50:19 host sshd[17106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 user=root Jan 14 21:50:19 host sshd[17106]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 21:50:19 host unix_chkpwd[17124]: password check failed for user (root) Jan 14 21:50:19 host sshd[17102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 user=root Jan 14 21:50:19 host sshd[17102]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 21:50:19 host unix_chkpwd[17126]: password check failed for user (root) Jan 14 21:50:19 host sshd[17103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.164.123 user=root Jan 14 21:50:19 host sshd[17103]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 21:50:21 host sshd[17101]: Failed password for invalid user ubuntu from 13.76.164.123 port 50456 ssh2 Jan 14 21:50:21 host sshd[17099]: Failed password for invalid user ftpuser from 13.76.164.123 port 50452 ssh2 Jan 14 21:50:21 host sshd[17100]: Failed password for invalid user git from 13.76.164.123 port 50482 ssh2 Jan 14 21:50:21 host sshd[17104]: Failed password for invalid user pi from 13.76.164.123 port 50426 ssh2 Jan 14 21:50:21 host sshd[17107]: Failed password for invalid user postgres from 13.76.164.123 port 50464 ssh2 Jan 14 21:50:21 host sshd[17108]: Failed password for invalid user ansible from 13.76.164.123 port 50418 ssh2 Jan 14 21:50:21 host sshd[17109]: Failed password for invalid user pi from 13.76.164.123 port 50432 ssh2 Jan 14 21:50:21 host sshd[17110]: Failed password for invalid user steam from 13.76.164.123 port 50442 ssh2 Jan 14 21:50:21 host sshd[17105]: Failed password for invalid user root from 13.76.164.123 port 50472 ssh2 Jan 14 21:50:21 host sshd[17106]: Failed password for invalid user root from 13.76.164.123 port 50480 ssh2 Jan 14 21:50:21 host sshd[17102]: Failed password for invalid user root from 13.76.164.123 port 50436 ssh2 Jan 14 21:50:21 host sshd[17103]: Failed password for invalid user root from 13.76.164.123 port 50478 ssh2 Jan 14 21:51:31 host sshd[17310]: Invalid user pi from 121.133.205.146 port 53385 Jan 14 21:51:31 host sshd[17310]: input_userauth_request: invalid user pi [preauth] Jan 14 21:51:31 host sshd[17310]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:51:31 host sshd[17310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.133.205.146 Jan 14 21:51:33 host sshd[17310]: Failed password for invalid user pi from 121.133.205.146 port 53385 ssh2 Jan 14 21:51:33 host sshd[17310]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:51:35 host sshd[17310]: Failed password for invalid user pi from 121.133.205.146 port 53385 ssh2 Jan 14 21:51:36 host sshd[17310]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:51:38 host sshd[17310]: Failed password for invalid user pi from 121.133.205.146 port 53385 ssh2 Jan 14 21:51:38 host sshd[17310]: Connection reset by 121.133.205.146 port 53385 [preauth] Jan 14 21:51:38 host sshd[17310]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.133.205.146 Jan 14 21:51:49 host sshd[17337]: User root from 218.150.99.145 not allowed because not listed in AllowUsers Jan 14 21:51:49 host sshd[17337]: input_userauth_request: invalid user root [preauth] Jan 14 21:51:49 host unix_chkpwd[17347]: password check failed for user (root) Jan 14 21:51:49 host sshd[17337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.150.99.145 user=root Jan 14 21:51:49 host sshd[17337]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 21:51:51 host sshd[17337]: Failed password for invalid user root from 218.150.99.145 port 53570 ssh2 Jan 14 21:51:52 host sshd[17337]: Connection reset by 218.150.99.145 port 53570 [preauth] Jan 14 21:54:15 host sshd[17578]: Invalid user admin from 112.185.210.208 port 62273 Jan 14 21:54:15 host sshd[17578]: input_userauth_request: invalid user admin [preauth] Jan 14 21:54:15 host sshd[17578]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:54:15 host sshd[17578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.185.210.208 Jan 14 21:54:17 host sshd[17578]: Failed password for invalid user admin from 112.185.210.208 port 62273 ssh2 Jan 14 21:54:19 host sshd[17578]: Failed password for invalid user admin from 112.185.210.208 port 62273 ssh2 Jan 14 21:54:20 host sshd[17578]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:54:22 host sshd[17578]: Failed password for invalid user admin from 112.185.210.208 port 62273 ssh2 Jan 14 21:54:23 host sshd[17578]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:54:25 host sshd[17578]: Failed password for invalid user admin from 112.185.210.208 port 62273 ssh2 Jan 14 21:54:26 host sshd[17578]: Connection reset by 112.185.210.208 port 62273 [preauth] Jan 14 21:54:26 host sshd[17578]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.185.210.208 Jan 14 21:55:40 host sshd[17755]: Invalid user pi from 128.127.164.217 port 51512 Jan 14 21:55:40 host sshd[17755]: input_userauth_request: invalid user pi [preauth] Jan 14 21:55:40 host sshd[17755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:55:40 host sshd[17755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.127.164.217 Jan 14 21:55:41 host sshd[17755]: Failed password for invalid user pi from 128.127.164.217 port 51512 ssh2 Jan 14 21:55:42 host sshd[17755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:55:43 host sshd[17755]: Failed password for invalid user pi from 128.127.164.217 port 51512 ssh2 Jan 14 21:55:44 host sshd[17755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:55:47 host sshd[17755]: Failed password for invalid user pi from 128.127.164.217 port 51512 ssh2 Jan 14 21:55:48 host sshd[17755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:55:50 host sshd[17755]: Failed password for invalid user pi from 128.127.164.217 port 51512 ssh2 Jan 14 21:55:51 host sshd[17755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:55:53 host sshd[17755]: Failed password for invalid user pi from 128.127.164.217 port 51512 ssh2 Jan 14 21:55:54 host sshd[17755]: pam_unix(sshd:auth): check pass; user unknown Jan 14 21:55:55 host sshd[17755]: Failed password for invalid user pi from 128.127.164.217 port 51512 ssh2 Jan 14 21:55:55 host sshd[17755]: error: maximum authentication attempts exceeded for invalid user pi from 128.127.164.217 port 51512 ssh2 [preauth] Jan 14 21:55:55 host sshd[17755]: Disconnecting: Too many authentication failures [preauth] Jan 14 21:55:55 host sshd[17755]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.127.164.217 Jan 14 21:55:55 host sshd[17755]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 14 22:04:48 host sshd[18959]: Connection reset by 121.176.13.82 port 60420 [preauth] Jan 14 22:07:59 host sshd[19419]: Did not receive identification string from 178.128.72.150 port 46782 Jan 14 22:08:36 host sshd[19494]: Invalid user minecraft from 178.128.72.150 port 42788 Jan 14 22:08:36 host sshd[19494]: input_userauth_request: invalid user minecraft [preauth] Jan 14 22:08:36 host sshd[19494]: pam_unix(sshd:auth): check pass; user unknown Jan 14 22:08:36 host sshd[19494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.72.150 Jan 14 22:08:39 host sshd[19494]: Failed password for invalid user minecraft from 178.128.72.150 port 42788 ssh2 Jan 14 22:08:39 host sshd[19494]: Received disconnect from 178.128.72.150 port 42788:11: Normal Shutdown, Thank you for playing [preauth] Jan 14 22:08:39 host sshd[19494]: Disconnected from 178.128.72.150 port 42788 [preauth] Jan 14 22:09:03 host sshd[19551]: Invalid user user from 178.128.72.150 port 33992 Jan 14 22:09:03 host sshd[19551]: input_userauth_request: invalid user user [preauth] Jan 14 22:09:03 host sshd[19551]: pam_unix(sshd:auth): check pass; user unknown Jan 14 22:09:03 host sshd[19551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.72.150 Jan 14 22:09:05 host sshd[19551]: Failed password for invalid user user from 178.128.72.150 port 33992 ssh2 Jan 14 22:09:05 host sshd[19551]: Received disconnect from 178.128.72.150 port 33992:11: Normal Shutdown, Thank you for playing [preauth] Jan 14 22:09:05 host sshd[19551]: Disconnected from 178.128.72.150 port 33992 [preauth] Jan 14 22:15:55 host sshd[20508]: Invalid user admin from 123.205.58.21 port 38855 Jan 14 22:15:55 host sshd[20508]: input_userauth_request: invalid user admin [preauth] Jan 14 22:15:55 host sshd[20508]: pam_unix(sshd:auth): check pass; user unknown Jan 14 22:15:55 host sshd[20508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.205.58.21 Jan 14 22:15:56 host sshd[20508]: Failed password for invalid user admin from 123.205.58.21 port 38855 ssh2 Jan 14 22:15:57 host sshd[20508]: Failed password for invalid user admin from 123.205.58.21 port 38855 ssh2 Jan 14 22:15:58 host sshd[20508]: pam_unix(sshd:auth): check pass; user unknown Jan 14 22:15:59 host sshd[20508]: Failed password for invalid user admin from 123.205.58.21 port 38855 ssh2 Jan 14 22:16:00 host sshd[20508]: Connection reset by 123.205.58.21 port 38855 [preauth] Jan 14 22:16:00 host sshd[20508]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.205.58.21 Jan 14 22:17:56 host sshd[20704]: User root from 61.85.153.132 not allowed because not listed in AllowUsers Jan 14 22:17:56 host sshd[20704]: input_userauth_request: invalid user root [preauth] Jan 14 22:17:56 host unix_chkpwd[20709]: password check failed for user (root) Jan 14 22:17:56 host sshd[20704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.85.153.132 user=root Jan 14 22:17:56 host sshd[20704]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 22:17:58 host sshd[20704]: Failed password for invalid user root from 61.85.153.132 port 61437 ssh2 Jan 14 22:18:00 host sshd[20704]: Connection reset by 61.85.153.132 port 61437 [preauth] Jan 14 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=wwwrmswll user-7=keralaholi user-8=wwwresourcehunte user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=wwwkapin user-17=woodpeck user-18=remysagr user-19=disposeat user-20=wwwkmaorg user-21=mrsclean user-22=wwwnexidigital user-23=gifterman user-24=palco123 user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 22:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3daOkXfm3B8cZOw5.~ Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3daOkXfm3B8cZOw5.~' Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3daOkXfm3B8cZOw5.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 22:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 22:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 22:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 22:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 22:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 22:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 22:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 22:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 22:24:53 host sshd[21743]: Invalid user super from 119.204.158.136 port 62384 Jan 14 22:24:53 host sshd[21743]: input_userauth_request: invalid user super [preauth] Jan 14 22:24:53 host sshd[21743]: pam_unix(sshd:auth): check pass; user unknown Jan 14 22:24:53 host sshd[21743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.204.158.136 Jan 14 22:24:55 host sshd[21743]: Failed password for invalid user super from 119.204.158.136 port 62384 ssh2 Jan 14 22:24:55 host sshd[21743]: Connection reset by 119.204.158.136 port 62384 [preauth] Jan 14 22:26:37 host sshd[22059]: Invalid user zyfwp from 211.253.170.241 port 62989 Jan 14 22:26:37 host sshd[22059]: input_userauth_request: invalid user zyfwp [preauth] Jan 14 22:26:37 host sshd[22059]: pam_unix(sshd:auth): check pass; user unknown Jan 14 22:26:37 host sshd[22059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.170.241 Jan 14 22:26:40 host sshd[22059]: Failed password for invalid user zyfwp from 211.253.170.241 port 62989 ssh2 Jan 14 22:26:41 host sshd[22059]: Connection reset by 211.253.170.241 port 62989 [preauth] Jan 14 22:34:25 host sshd[22943]: Invalid user ec from 194.110.203.109 port 46608 Jan 14 22:34:25 host sshd[22943]: input_userauth_request: invalid user ec [preauth] Jan 14 22:34:25 host sshd[22943]: pam_unix(sshd:auth): check pass; user unknown Jan 14 22:34:25 host sshd[22943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 22:34:27 host sshd[22943]: Failed password for invalid user ec from 194.110.203.109 port 46608 ssh2 Jan 14 22:34:30 host sshd[22943]: pam_unix(sshd:auth): check pass; user unknown Jan 14 22:34:32 host sshd[22943]: Failed password for invalid user ec from 194.110.203.109 port 46608 ssh2 Jan 14 22:34:35 host sshd[22943]: pam_unix(sshd:auth): check pass; user unknown Jan 14 22:34:37 host sshd[22943]: Failed password for invalid user ec from 194.110.203.109 port 46608 ssh2 Jan 14 22:34:40 host sshd[22943]: Connection closed by 194.110.203.109 port 46608 [preauth] Jan 14 22:34:40 host sshd[22943]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 14 22:52:46 host sshd[25262]: Did not receive identification string from 193.35.18.139 port 39242 Jan 14 22:53:26 host sshd[25337]: Did not receive identification string from 193.35.18.139 port 34842 Jan 14 22:54:50 host sshd[25491]: User root from 193.35.18.139 not allowed because not listed in AllowUsers Jan 14 22:54:50 host sshd[25491]: input_userauth_request: invalid user root [preauth] Jan 14 22:54:50 host unix_chkpwd[25494]: password check failed for user (root) Jan 14 22:54:50 host sshd[25491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.35.18.139 user=root Jan 14 22:54:50 host sshd[25491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 22:54:52 host sshd[25491]: Failed password for invalid user root from 193.35.18.139 port 53896 ssh2 Jan 14 22:54:52 host sshd[25491]: Received disconnect from 193.35.18.139 port 53896:11: Normal Shutdown, Thank you for playing [preauth] Jan 14 22:54:52 host sshd[25491]: Disconnected from 193.35.18.139 port 53896 [preauth] Jan 14 22:57:07 host sshd[25898]: Connection reset by 211.221.207.10 port 62766 [preauth] Jan 14 23:03:54 host sshd[26820]: Connection closed by 66.240.236.109 port 46144 [preauth] Jan 14 23:14:23 host sshd[28283]: User lp from 205.185.113.129 not allowed because not listed in AllowUsers Jan 14 23:14:23 host sshd[28283]: input_userauth_request: invalid user lp [preauth] Jan 14 23:14:23 host unix_chkpwd[28288]: password check failed for user (lp) Jan 14 23:14:23 host sshd[28283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 user=lp Jan 14 23:14:23 host sshd[28283]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "lp" Jan 14 23:14:25 host sshd[28283]: Failed password for invalid user lp from 205.185.113.129 port 56672 ssh2 Jan 14 23:14:25 host sshd[28283]: Connection closed by 205.185.113.129 port 56672 [preauth] Jan 14 23:14:54 host sshd[28359]: Invalid user Admin from 71.25.125.233 port 16218 Jan 14 23:14:54 host sshd[28359]: input_userauth_request: invalid user Admin [preauth] Jan 14 23:14:54 host sshd[28359]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:14:54 host sshd[28359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.25.125.233 Jan 14 23:14:56 host sshd[28359]: Failed password for invalid user Admin from 71.25.125.233 port 16218 ssh2 Jan 14 23:14:57 host sshd[28359]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:14:59 host sshd[28359]: Failed password for invalid user Admin from 71.25.125.233 port 16218 ssh2 Jan 14 23:15:18 host sshd[28359]: Connection reset by 71.25.125.233 port 16218 [preauth] Jan 14 23:15:18 host sshd[28359]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.25.125.233 Jan 14 23:19:32 host sshd[29207]: Connection reset by 125.229.192.27 port 37042 [preauth] Jan 14 23:20:40 host sshd[29409]: Invalid user admin from 121.176.104.38 port 60078 Jan 14 23:20:40 host sshd[29409]: input_userauth_request: invalid user admin [preauth] Jan 14 23:20:40 host sshd[29409]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:20:40 host sshd[29409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.176.104.38 Jan 14 23:20:42 host sshd[29409]: Failed password for invalid user admin from 121.176.104.38 port 60078 ssh2 Jan 14 23:20:43 host sshd[29409]: Failed password for invalid user admin from 121.176.104.38 port 60078 ssh2 Jan 14 23:20:44 host sshd[29409]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:20:47 host sshd[29409]: Failed password for invalid user admin from 121.176.104.38 port 60078 ssh2 Jan 14 23:20:47 host sshd[29409]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:20:49 host sshd[29409]: Failed password for invalid user admin from 121.176.104.38 port 60078 ssh2 Jan 14 23:20:50 host sshd[29409]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:20:52 host sshd[29409]: Failed password for invalid user admin from 121.176.104.38 port 60078 ssh2 Jan 14 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=cochintaxi user-11=wwwkaretakers user-12=wwwnexidigital user-13=mrsclean user-14=kottayamcalldriv user-15=phmetals user-16=gifterman user-17=palco123 user-18=straightcurve user-19=wwwletsstalkfood user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=woodpeck user-27=wwwkapin user-28=wwwkmaorg user-29=disposeat user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 14 23:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iSbUgvI52xlFvQa8.~ Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iSbUgvI52xlFvQa8.~' Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iSbUgvI52xlFvQa8.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 14 23:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 14 23:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 14 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 14 23:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 14 23:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 14 23:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 14 23:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 14 23:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 14 23:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 14 23:23:30 host sshd[30151]: Did not receive identification string from 8.219.76.192 port 61000 Jan 14 23:31:45 host sshd[31421]: User root from 119.74.111.98 not allowed because not listed in AllowUsers Jan 14 23:31:45 host sshd[31421]: input_userauth_request: invalid user root [preauth] Jan 14 23:31:45 host unix_chkpwd[31426]: password check failed for user (root) Jan 14 23:31:45 host sshd[31421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.74.111.98 user=root Jan 14 23:31:45 host sshd[31421]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 23:31:47 host sshd[31421]: Failed password for invalid user root from 119.74.111.98 port 37799 ssh2 Jan 14 23:31:47 host sshd[31421]: Connection reset by 119.74.111.98 port 37799 [preauth] Jan 14 23:33:06 host sshd[31553]: Did not receive identification string from 107.170.240.23 port 52792 Jan 14 23:40:14 host sshd[32674]: User root from 220.135.149.208 not allowed because not listed in AllowUsers Jan 14 23:40:14 host sshd[32674]: input_userauth_request: invalid user root [preauth] Jan 14 23:40:14 host unix_chkpwd[32680]: password check failed for user (root) Jan 14 23:40:14 host sshd[32674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.149.208 user=root Jan 14 23:40:14 host sshd[32674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 23:40:16 host sshd[32674]: Failed password for invalid user root from 220.135.149.208 port 47718 ssh2 Jan 14 23:40:17 host unix_chkpwd[32683]: password check failed for user (root) Jan 14 23:40:17 host sshd[32674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 23:40:19 host sshd[32674]: Failed password for invalid user root from 220.135.149.208 port 47718 ssh2 Jan 14 23:40:20 host unix_chkpwd[32686]: password check failed for user (root) Jan 14 23:40:20 host sshd[32674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 23:40:22 host sshd[32674]: Failed password for invalid user root from 220.135.149.208 port 47718 ssh2 Jan 14 23:42:25 host sshd[462]: Invalid user zyfwp from 59.126.192.206 port 32784 Jan 14 23:42:25 host sshd[462]: input_userauth_request: invalid user zyfwp [preauth] Jan 14 23:42:25 host sshd[462]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:42:25 host sshd[462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.192.206 Jan 14 23:42:27 host sshd[462]: Failed password for invalid user zyfwp from 59.126.192.206 port 32784 ssh2 Jan 14 23:42:28 host sshd[462]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:42:30 host sshd[462]: Failed password for invalid user zyfwp from 59.126.192.206 port 32784 ssh2 Jan 14 23:42:30 host sshd[462]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:42:33 host sshd[462]: Failed password for invalid user zyfwp from 59.126.192.206 port 32784 ssh2 Jan 14 23:42:33 host sshd[462]: Connection closed by 59.126.192.206 port 32784 [preauth] Jan 14 23:42:33 host sshd[462]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.192.206 Jan 14 23:42:54 host sshd[529]: User root from 61.146.48.118 not allowed because not listed in AllowUsers Jan 14 23:42:54 host sshd[529]: input_userauth_request: invalid user root [preauth] Jan 14 23:42:55 host unix_chkpwd[539]: password check failed for user (root) Jan 14 23:42:55 host sshd[529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.146.48.118 user=root Jan 14 23:42:55 host sshd[529]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 23:42:57 host sshd[529]: Failed password for invalid user root from 61.146.48.118 port 60013 ssh2 Jan 14 23:42:57 host unix_chkpwd[542]: password check failed for user (root) Jan 14 23:42:57 host sshd[529]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 23:42:59 host sshd[529]: Failed password for invalid user root from 61.146.48.118 port 60013 ssh2 Jan 14 23:42:59 host unix_chkpwd[544]: password check failed for user (root) Jan 14 23:42:59 host sshd[529]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 23:43:01 host sshd[529]: Failed password for invalid user root from 61.146.48.118 port 60013 ssh2 Jan 14 23:43:02 host unix_chkpwd[563]: password check failed for user (root) Jan 14 23:43:02 host sshd[529]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 14 23:43:04 host sshd[529]: Failed password for invalid user root from 61.146.48.118 port 60013 ssh2 Jan 14 23:52:46 host sshd[2086]: Invalid user hadoop from 162.252.102.236 port 34673 Jan 14 23:52:46 host sshd[2086]: input_userauth_request: invalid user hadoop [preauth] Jan 14 23:52:46 host sshd[2086]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:52:46 host sshd[2086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.102.236 Jan 14 23:52:47 host sshd[2086]: Failed password for invalid user hadoop from 162.252.102.236 port 34673 ssh2 Jan 14 23:52:49 host sshd[2086]: Failed password for invalid user hadoop from 162.252.102.236 port 34673 ssh2 Jan 14 23:52:49 host sshd[2086]: Connection closed by 162.252.102.236 port 34673 [preauth] Jan 14 23:56:35 host sshd[2804]: Invalid user sFTPUser from 218.32.106.102 port 52263 Jan 14 23:56:35 host sshd[2804]: input_userauth_request: invalid user sFTPUser [preauth] Jan 14 23:56:35 host sshd[2804]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:56:35 host sshd[2804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.32.106.102 Jan 14 23:56:37 host sshd[2804]: Failed password for invalid user sFTPUser from 218.32.106.102 port 52263 ssh2 Jan 14 23:56:37 host sshd[2804]: Connection reset by 218.32.106.102 port 52263 [preauth] Jan 14 23:56:53 host sshd[2843]: Invalid user jimmy from 107.189.30.59 port 33716 Jan 14 23:56:53 host sshd[2843]: input_userauth_request: invalid user jimmy [preauth] Jan 14 23:56:53 host sshd[2843]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:56:53 host sshd[2843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 14 23:56:55 host sshd[2843]: Failed password for invalid user jimmy from 107.189.30.59 port 33716 ssh2 Jan 14 23:56:56 host sshd[2843]: Connection closed by 107.189.30.59 port 33716 [preauth] Jan 14 23:58:55 host sshd[3237]: Invalid user admin from 59.11.231.230 port 61988 Jan 14 23:58:55 host sshd[3237]: input_userauth_request: invalid user admin [preauth] Jan 14 23:58:55 host sshd[3237]: pam_unix(sshd:auth): check pass; user unknown Jan 14 23:58:55 host sshd[3237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.11.231.230 Jan 14 23:58:57 host sshd[3237]: Failed password for invalid user admin from 59.11.231.230 port 61988 ssh2 Jan 14 23:58:58 host sshd[3237]: Failed password for invalid user admin from 59.11.231.230 port 61988 ssh2 Jan 14 23:58:58 host sshd[3237]: Connection reset by 59.11.231.230 port 61988 [preauth] Jan 15 00:15:22 host sshd[6208]: Connection closed by 172.104.11.34 port 9088 [preauth] Jan 15 00:15:23 host sshd[6246]: Connection closed by 172.104.11.34 port 9094 [preauth] Jan 15 00:15:25 host sshd[6283]: Connection closed by 172.104.11.34 port 9106 [preauth] Jan 15 00:19:57 host sshd[7441]: Invalid user ed from 194.110.203.109 port 59048 Jan 15 00:19:57 host sshd[7441]: input_userauth_request: invalid user ed [preauth] Jan 15 00:19:57 host sshd[7441]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:19:57 host sshd[7441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 00:19:59 host sshd[7441]: Failed password for invalid user ed from 194.110.203.109 port 59048 ssh2 Jan 15 00:20:02 host sshd[7441]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:20:05 host sshd[7441]: Failed password for invalid user ed from 194.110.203.109 port 59048 ssh2 Jan 15 00:20:08 host sshd[7441]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:20:10 host sshd[7441]: Failed password for invalid user ed from 194.110.203.109 port 59048 ssh2 Jan 15 00:20:14 host sshd[7441]: Connection closed by 194.110.203.109 port 59048 [preauth] Jan 15 00:20:14 host sshd[7441]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 00:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 00:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=phmetals user-19=kottayamcalldriv user-20=palco123 user-21=gifterman user-22=wwwkapin user-23=woodpeck user-24=disposeat user-25=remysagr user-26=wwwkmaorg user-27=pmcresources user-28=shalinijames user-29=wwwtestugo user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 00:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-75Ip8rqzuBLbuSs3.~ Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-75Ip8rqzuBLbuSs3.~' Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-75Ip8rqzuBLbuSs3.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 00:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 00:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 00:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 00:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 00:32:25 host sshd[9472]: User root from 223.205.56.202 not allowed because not listed in AllowUsers Jan 15 00:32:25 host sshd[9472]: input_userauth_request: invalid user root [preauth] Jan 15 00:32:25 host unix_chkpwd[9475]: password check failed for user (root) Jan 15 00:32:25 host sshd[9472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.205.56.202 user=root Jan 15 00:32:25 host sshd[9472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 00:32:27 host sshd[9472]: Failed password for invalid user root from 223.205.56.202 port 15546 ssh2 Jan 15 00:32:28 host unix_chkpwd[9478]: password check failed for user (root) Jan 15 00:32:28 host sshd[9472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 00:32:29 host sshd[9472]: Failed password for invalid user root from 223.205.56.202 port 15546 ssh2 Jan 15 00:32:30 host unix_chkpwd[9506]: password check failed for user (root) Jan 15 00:32:30 host sshd[9472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 00:32:32 host sshd[9472]: Failed password for invalid user root from 223.205.56.202 port 15546 ssh2 Jan 15 00:32:32 host unix_chkpwd[9509]: password check failed for user (root) Jan 15 00:32:32 host sshd[9472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 00:32:34 host sshd[9472]: Failed password for invalid user root from 223.205.56.202 port 15546 ssh2 Jan 15 00:32:34 host unix_chkpwd[9516]: password check failed for user (root) Jan 15 00:32:34 host sshd[9472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 00:32:36 host sshd[9472]: Failed password for invalid user root from 223.205.56.202 port 15546 ssh2 Jan 15 00:34:01 host sshd[9713]: User root from 61.76.147.51 not allowed because not listed in AllowUsers Jan 15 00:34:01 host sshd[9713]: input_userauth_request: invalid user root [preauth] Jan 15 00:34:01 host unix_chkpwd[9718]: password check failed for user (root) Jan 15 00:34:01 host sshd[9713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.147.51 user=root Jan 15 00:34:01 host sshd[9713]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 00:34:03 host sshd[9713]: Failed password for invalid user root from 61.76.147.51 port 63556 ssh2 Jan 15 00:34:04 host sshd[9713]: Connection reset by 61.76.147.51 port 63556 [preauth] Jan 15 00:34:54 host sshd[9818]: Invalid user liyuzhen from 217.133.27.74 port 49104 Jan 15 00:34:54 host sshd[9818]: input_userauth_request: invalid user liyuzhen [preauth] Jan 15 00:34:54 host sshd[9818]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:34:54 host sshd[9818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.133.27.74 Jan 15 00:34:56 host sshd[9822]: Invalid user wojiushiwo from 5.195.238.46 port 54156 Jan 15 00:34:56 host sshd[9822]: input_userauth_request: invalid user wojiushiwo [preauth] Jan 15 00:34:56 host sshd[9822]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:34:56 host sshd[9822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.195.238.46 Jan 15 00:34:57 host sshd[9818]: Failed password for invalid user liyuzhen from 217.133.27.74 port 49104 ssh2 Jan 15 00:34:57 host sshd[9818]: Received disconnect from 217.133.27.74 port 49104:11: Bye Bye [preauth] Jan 15 00:34:57 host sshd[9818]: Disconnected from 217.133.27.74 port 49104 [preauth] Jan 15 00:34:58 host sshd[9822]: Failed password for invalid user wojiushiwo from 5.195.238.46 port 54156 ssh2 Jan 15 00:34:58 host sshd[9822]: Received disconnect from 5.195.238.46 port 54156:11: Bye Bye [preauth] Jan 15 00:34:58 host sshd[9822]: Disconnected from 5.195.238.46 port 54156 [preauth] Jan 15 00:35:58 host sshd[9959]: Invalid user antony from 93.67.138.66 port 57198 Jan 15 00:35:58 host sshd[9959]: input_userauth_request: invalid user antony [preauth] Jan 15 00:35:58 host sshd[9959]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:35:58 host sshd[9959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.67.138.66 Jan 15 00:36:00 host sshd[9959]: Failed password for invalid user antony from 93.67.138.66 port 57198 ssh2 Jan 15 00:36:00 host sshd[9959]: Received disconnect from 93.67.138.66 port 57198:11: Bye Bye [preauth] Jan 15 00:36:00 host sshd[9959]: Disconnected from 93.67.138.66 port 57198 [preauth] Jan 15 00:36:56 host sshd[10055]: Invalid user lilong from 128.199.66.208 port 37096 Jan 15 00:36:56 host sshd[10055]: input_userauth_request: invalid user lilong [preauth] Jan 15 00:36:56 host sshd[10055]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:36:56 host sshd[10055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.66.208 Jan 15 00:36:58 host sshd[10055]: Failed password for invalid user lilong from 128.199.66.208 port 37096 ssh2 Jan 15 00:36:58 host sshd[10055]: Received disconnect from 128.199.66.208 port 37096:11: Bye Bye [preauth] Jan 15 00:36:58 host sshd[10055]: Disconnected from 128.199.66.208 port 37096 [preauth] Jan 15 00:37:07 host sshd[10080]: Invalid user xiaowei from 160.248.1.93 port 54106 Jan 15 00:37:07 host sshd[10080]: input_userauth_request: invalid user xiaowei [preauth] Jan 15 00:37:07 host sshd[10080]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:37:07 host sshd[10080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.248.1.93 Jan 15 00:37:09 host sshd[10080]: Failed password for invalid user xiaowei from 160.248.1.93 port 54106 ssh2 Jan 15 00:37:09 host sshd[10080]: Received disconnect from 160.248.1.93 port 54106:11: Bye Bye [preauth] Jan 15 00:37:09 host sshd[10080]: Disconnected from 160.248.1.93 port 54106 [preauth] Jan 15 00:37:50 host sshd[10150]: Invalid user liushuai from 122.170.105.253 port 37916 Jan 15 00:37:50 host sshd[10150]: input_userauth_request: invalid user liushuai [preauth] Jan 15 00:37:50 host sshd[10150]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:37:50 host sshd[10150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.105.253 Jan 15 00:37:52 host sshd[10150]: Failed password for invalid user liushuai from 122.170.105.253 port 37916 ssh2 Jan 15 00:37:52 host sshd[10150]: Received disconnect from 122.170.105.253 port 37916:11: Bye Bye [preauth] Jan 15 00:37:52 host sshd[10150]: Disconnected from 122.170.105.253 port 37916 [preauth] Jan 15 00:38:25 host sshd[10207]: Invalid user wangdandan from 186.13.39.199 port 59172 Jan 15 00:38:25 host sshd[10207]: input_userauth_request: invalid user wangdandan [preauth] Jan 15 00:38:25 host sshd[10207]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:38:25 host sshd[10207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.13.39.199 Jan 15 00:38:26 host sshd[10207]: Failed password for invalid user wangdandan from 186.13.39.199 port 59172 ssh2 Jan 15 00:38:27 host sshd[10207]: Received disconnect from 186.13.39.199 port 59172:11: Bye Bye [preauth] Jan 15 00:38:27 host sshd[10207]: Disconnected from 186.13.39.199 port 59172 [preauth] Jan 15 00:39:55 host sshd[10490]: User root from 125.138.148.100 not allowed because not listed in AllowUsers Jan 15 00:39:55 host sshd[10490]: input_userauth_request: invalid user root [preauth] Jan 15 00:39:55 host unix_chkpwd[10494]: password check failed for user (root) Jan 15 00:39:55 host sshd[10490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.138.148.100 user=root Jan 15 00:39:55 host sshd[10490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 00:39:57 host sshd[10490]: Failed password for invalid user root from 125.138.148.100 port 61744 ssh2 Jan 15 00:39:58 host unix_chkpwd[10498]: password check failed for user (root) Jan 15 00:39:58 host sshd[10490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 00:40:01 host sshd[10490]: Failed password for invalid user root from 125.138.148.100 port 61744 ssh2 Jan 15 00:40:02 host unix_chkpwd[10542]: password check failed for user (root) Jan 15 00:40:02 host sshd[10490]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 00:40:04 host sshd[10490]: Failed password for invalid user root from 125.138.148.100 port 61744 ssh2 Jan 15 00:40:04 host sshd[10490]: Connection reset by 125.138.148.100 port 61744 [preauth] Jan 15 00:40:04 host sshd[10490]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.138.148.100 user=root Jan 15 00:40:50 host sshd[10657]: Invalid user jclayto1 from 5.195.238.46 port 55376 Jan 15 00:40:50 host sshd[10657]: input_userauth_request: invalid user jclayto1 [preauth] Jan 15 00:40:50 host sshd[10657]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:40:50 host sshd[10657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.195.238.46 Jan 15 00:40:52 host sshd[10657]: Failed password for invalid user jclayto1 from 5.195.238.46 port 55376 ssh2 Jan 15 00:40:52 host sshd[10657]: Received disconnect from 5.195.238.46 port 55376:11: Bye Bye [preauth] Jan 15 00:40:52 host sshd[10657]: Disconnected from 5.195.238.46 port 55376 [preauth] Jan 15 00:40:55 host sshd[10662]: Invalid user hadoop from 220.125.195.100 port 61997 Jan 15 00:40:55 host sshd[10662]: input_userauth_request: invalid user hadoop [preauth] Jan 15 00:40:55 host sshd[10662]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:40:55 host sshd[10662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.125.195.100 Jan 15 00:40:58 host sshd[10662]: Failed password for invalid user hadoop from 220.125.195.100 port 61997 ssh2 Jan 15 00:40:58 host sshd[10662]: Failed password for invalid user hadoop from 220.125.195.100 port 61997 ssh2 Jan 15 00:41:13 host sshd[10703]: ssh_dispatch_run_fatal: Connection from 207.229.167.36 port 56394: Connection corrupted [preauth] Jan 15 00:41:26 host sshd[10731]: Invalid user ngetty from 93.67.138.66 port 51886 Jan 15 00:41:26 host sshd[10731]: input_userauth_request: invalid user ngetty [preauth] Jan 15 00:41:26 host sshd[10731]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:41:26 host sshd[10731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.67.138.66 Jan 15 00:41:27 host sshd[10731]: Failed password for invalid user ngetty from 93.67.138.66 port 51886 ssh2 Jan 15 00:41:28 host sshd[10731]: Received disconnect from 93.67.138.66 port 51886:11: Bye Bye [preauth] Jan 15 00:41:28 host sshd[10731]: Disconnected from 93.67.138.66 port 51886 [preauth] Jan 15 00:42:08 host sshd[10821]: Invalid user hhlin from 217.133.27.74 port 50293 Jan 15 00:42:08 host sshd[10821]: input_userauth_request: invalid user hhlin [preauth] Jan 15 00:42:08 host sshd[10821]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:42:08 host sshd[10821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.133.27.74 Jan 15 00:42:10 host sshd[10821]: Failed password for invalid user hhlin from 217.133.27.74 port 50293 ssh2 Jan 15 00:42:10 host sshd[10821]: Received disconnect from 217.133.27.74 port 50293:11: Bye Bye [preauth] Jan 15 00:42:10 host sshd[10821]: Disconnected from 217.133.27.74 port 50293 [preauth] Jan 15 00:42:11 host sshd[10826]: Invalid user gepterem from 122.170.105.253 port 57212 Jan 15 00:42:11 host sshd[10826]: input_userauth_request: invalid user gepterem [preauth] Jan 15 00:42:11 host sshd[10826]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:42:11 host sshd[10826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.105.253 Jan 15 00:42:12 host sshd[10826]: Failed password for invalid user gepterem from 122.170.105.253 port 57212 ssh2 Jan 15 00:42:12 host sshd[10826]: Received disconnect from 122.170.105.253 port 57212:11: Bye Bye [preauth] Jan 15 00:42:12 host sshd[10826]: Disconnected from 122.170.105.253 port 57212 [preauth] Jan 15 00:42:18 host sshd[10834]: Invalid user plucon from 128.199.66.208 port 57686 Jan 15 00:42:18 host sshd[10834]: input_userauth_request: invalid user plucon [preauth] Jan 15 00:42:18 host sshd[10834]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:42:18 host sshd[10834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.66.208 Jan 15 00:42:20 host sshd[10834]: Failed password for invalid user plucon from 128.199.66.208 port 57686 ssh2 Jan 15 00:42:20 host sshd[10834]: Received disconnect from 128.199.66.208 port 57686:11: Bye Bye [preauth] Jan 15 00:42:20 host sshd[10834]: Disconnected from 128.199.66.208 port 57686 [preauth] Jan 15 00:42:24 host sshd[10841]: Invalid user lczheng from 160.248.1.93 port 46606 Jan 15 00:42:24 host sshd[10841]: input_userauth_request: invalid user lczheng [preauth] Jan 15 00:42:24 host sshd[10841]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:42:24 host sshd[10841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.248.1.93 Jan 15 00:42:26 host sshd[10841]: Failed password for invalid user lczheng from 160.248.1.93 port 46606 ssh2 Jan 15 00:42:26 host sshd[10841]: Received disconnect from 160.248.1.93 port 46606:11: Bye Bye [preauth] Jan 15 00:42:26 host sshd[10841]: Disconnected from 160.248.1.93 port 46606 [preauth] Jan 15 00:42:30 host sshd[10869]: Invalid user liufengying from 93.67.138.66 port 46436 Jan 15 00:42:30 host sshd[10869]: input_userauth_request: invalid user liufengying [preauth] Jan 15 00:42:30 host sshd[10869]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:42:30 host sshd[10869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.67.138.66 Jan 15 00:42:32 host sshd[10869]: Failed password for invalid user liufengying from 93.67.138.66 port 46436 ssh2 Jan 15 00:42:32 host sshd[10869]: Received disconnect from 93.67.138.66 port 46436:11: Bye Bye [preauth] Jan 15 00:42:32 host sshd[10869]: Disconnected from 93.67.138.66 port 46436 [preauth] Jan 15 00:42:53 host sshd[10924]: Invalid user zihan from 5.195.238.46 port 54306 Jan 15 00:42:53 host sshd[10924]: input_userauth_request: invalid user zihan [preauth] Jan 15 00:42:53 host sshd[10924]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:42:53 host sshd[10924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.195.238.46 Jan 15 00:42:55 host sshd[10924]: Failed password for invalid user zihan from 5.195.238.46 port 54306 ssh2 Jan 15 00:42:55 host sshd[10924]: Received disconnect from 5.195.238.46 port 54306:11: Bye Bye [preauth] Jan 15 00:42:55 host sshd[10924]: Disconnected from 5.195.238.46 port 54306 [preauth] Jan 15 00:43:17 host sshd[11004]: Invalid user zhoufeng from 217.133.27.74 port 33352 Jan 15 00:43:17 host sshd[11004]: input_userauth_request: invalid user zhoufeng [preauth] Jan 15 00:43:17 host sshd[11004]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:43:17 host sshd[11004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.133.27.74 Jan 15 00:43:18 host sshd[11004]: Failed password for invalid user zhoufeng from 217.133.27.74 port 33352 ssh2 Jan 15 00:43:18 host sshd[11004]: Received disconnect from 217.133.27.74 port 33352:11: Bye Bye [preauth] Jan 15 00:43:18 host sshd[11004]: Disconnected from 217.133.27.74 port 33352 [preauth] Jan 15 00:43:29 host sshd[11071]: Invalid user chenxiulan from 122.170.105.253 port 40772 Jan 15 00:43:29 host sshd[11071]: input_userauth_request: invalid user chenxiulan [preauth] Jan 15 00:43:29 host sshd[11071]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:43:29 host sshd[11071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.105.253 Jan 15 00:43:31 host sshd[11071]: Failed password for invalid user chenxiulan from 122.170.105.253 port 40772 ssh2 Jan 15 00:43:37 host sshd[11114]: Invalid user liuyuhua from 128.199.66.208 port 51782 Jan 15 00:43:37 host sshd[11114]: input_userauth_request: invalid user liuyuhua [preauth] Jan 15 00:43:37 host sshd[11114]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:43:37 host sshd[11114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.66.208 Jan 15 00:43:39 host sshd[11114]: Failed password for invalid user liuyuhua from 128.199.66.208 port 51782 ssh2 Jan 15 00:43:39 host sshd[11114]: Received disconnect from 128.199.66.208 port 51782:11: Bye Bye [preauth] Jan 15 00:43:39 host sshd[11114]: Disconnected from 128.199.66.208 port 51782 [preauth] Jan 15 00:43:42 host sshd[11155]: Invalid user wangbin from 160.248.1.93 port 41476 Jan 15 00:43:42 host sshd[11155]: input_userauth_request: invalid user wangbin [preauth] Jan 15 00:43:42 host sshd[11155]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:43:42 host sshd[11155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.248.1.93 Jan 15 00:43:42 host sshd[11139]: Invalid user dingding from 186.13.39.199 port 53341 Jan 15 00:43:42 host sshd[11139]: input_userauth_request: invalid user dingding [preauth] Jan 15 00:43:42 host sshd[11139]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:43:42 host sshd[11139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.13.39.199 Jan 15 00:43:44 host sshd[11155]: Failed password for invalid user wangbin from 160.248.1.93 port 41476 ssh2 Jan 15 00:43:44 host sshd[11155]: Received disconnect from 160.248.1.93 port 41476:11: Bye Bye [preauth] Jan 15 00:43:44 host sshd[11155]: Disconnected from 160.248.1.93 port 41476 [preauth] Jan 15 00:43:44 host sshd[11139]: Failed password for invalid user dingding from 186.13.39.199 port 53341 ssh2 Jan 15 00:43:44 host sshd[11139]: Received disconnect from 186.13.39.199 port 53341:11: Bye Bye [preauth] Jan 15 00:43:44 host sshd[11139]: Disconnected from 186.13.39.199 port 53341 [preauth] Jan 15 00:45:17 host sshd[11468]: Invalid user woshinima from 186.13.39.199 port 36609 Jan 15 00:45:17 host sshd[11468]: input_userauth_request: invalid user woshinima [preauth] Jan 15 00:45:17 host sshd[11468]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:45:17 host sshd[11468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.13.39.199 Jan 15 00:45:19 host sshd[11468]: Failed password for invalid user woshinima from 186.13.39.199 port 36609 ssh2 Jan 15 00:45:20 host sshd[11468]: Received disconnect from 186.13.39.199 port 36609:11: Bye Bye [preauth] Jan 15 00:45:20 host sshd[11468]: Disconnected from 186.13.39.199 port 36609 [preauth] Jan 15 00:46:37 host sshd[11672]: Invalid user game from 209.141.55.27 port 40282 Jan 15 00:46:37 host sshd[11672]: input_userauth_request: invalid user game [preauth] Jan 15 00:46:37 host sshd[11672]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:46:37 host sshd[11672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 Jan 15 00:46:39 host sshd[11672]: Failed password for invalid user game from 209.141.55.27 port 40282 ssh2 Jan 15 00:46:39 host sshd[11672]: Received disconnect from 209.141.55.27 port 40282:11: Normal Shutdown, Thank you for playing [preauth] Jan 15 00:46:39 host sshd[11672]: Disconnected from 209.141.55.27 port 40282 [preauth] Jan 15 00:47:34 host sshd[11791]: Invalid user steam from 60.51.108.179 port 45039 Jan 15 00:47:34 host sshd[11791]: input_userauth_request: invalid user steam [preauth] Jan 15 00:47:34 host sshd[11791]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:47:34 host sshd[11791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.51.108.179 Jan 15 00:47:36 host sshd[11791]: Failed password for invalid user steam from 60.51.108.179 port 45039 ssh2 Jan 15 00:47:37 host sshd[11791]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:47:39 host sshd[11791]: Failed password for invalid user steam from 60.51.108.179 port 45039 ssh2 Jan 15 00:47:40 host sshd[11791]: Failed password for invalid user steam from 60.51.108.179 port 45039 ssh2 Jan 15 00:47:40 host sshd[11791]: Connection closed by 60.51.108.179 port 45039 [preauth] Jan 15 00:47:40 host sshd[11791]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.51.108.179 Jan 15 00:56:40 host sshd[12969]: Invalid user zefeng from 178.128.37.95 port 45936 Jan 15 00:56:40 host sshd[12969]: input_userauth_request: invalid user zefeng [preauth] Jan 15 00:56:40 host sshd[12969]: pam_unix(sshd:auth): check pass; user unknown Jan 15 00:56:40 host sshd[12969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.37.95 Jan 15 00:56:42 host sshd[12969]: Failed password for invalid user zefeng from 178.128.37.95 port 45936 ssh2 Jan 15 00:56:43 host sshd[12969]: Received disconnect from 178.128.37.95 port 45936:11: Bye Bye [preauth] Jan 15 00:56:43 host sshd[12969]: Disconnected from 178.128.37.95 port 45936 [preauth] Jan 15 01:02:56 host sshd[13851]: Invalid user shobhitv from 178.128.37.95 port 46778 Jan 15 01:02:56 host sshd[13851]: input_userauth_request: invalid user shobhitv [preauth] Jan 15 01:02:56 host sshd[13851]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:02:56 host sshd[13851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.37.95 Jan 15 01:02:58 host sshd[13851]: Failed password for invalid user shobhitv from 178.128.37.95 port 46778 ssh2 Jan 15 01:02:59 host sshd[13851]: Received disconnect from 178.128.37.95 port 46778:11: Bye Bye [preauth] Jan 15 01:02:59 host sshd[13851]: Disconnected from 178.128.37.95 port 46778 [preauth] Jan 15 01:03:58 host sshd[14089]: Invalid user wangyuhua from 178.128.37.95 port 41000 Jan 15 01:03:58 host sshd[14089]: input_userauth_request: invalid user wangyuhua [preauth] Jan 15 01:03:58 host sshd[14089]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:03:58 host sshd[14089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.37.95 Jan 15 01:03:59 host sshd[14089]: Failed password for invalid user wangyuhua from 178.128.37.95 port 41000 ssh2 Jan 15 01:04:00 host sshd[14089]: Received disconnect from 178.128.37.95 port 41000:11: Bye Bye [preauth] Jan 15 01:04:00 host sshd[14089]: Disconnected from 178.128.37.95 port 41000 [preauth] Jan 15 01:05:59 host sshd[14365]: Invalid user pi from 59.126.118.219 port 60550 Jan 15 01:05:59 host sshd[14365]: input_userauth_request: invalid user pi [preauth] Jan 15 01:05:59 host sshd[14365]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:05:59 host sshd[14365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.118.219 Jan 15 01:06:01 host sshd[14365]: Failed password for invalid user pi from 59.126.118.219 port 60550 ssh2 Jan 15 01:06:02 host sshd[14365]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:06:04 host sshd[14365]: Failed password for invalid user pi from 59.126.118.219 port 60550 ssh2 Jan 15 01:06:05 host sshd[14365]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:06:07 host sshd[14365]: Failed password for invalid user pi from 59.126.118.219 port 60550 ssh2 Jan 15 01:06:08 host sshd[14365]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:06:10 host sshd[14365]: Failed password for invalid user pi from 59.126.118.219 port 60550 ssh2 Jan 15 01:06:11 host sshd[14365]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:06:13 host sshd[14365]: Failed password for invalid user pi from 59.126.118.219 port 60550 ssh2 Jan 15 01:09:01 host sshd[14697]: Invalid user admin from 221.153.72.137 port 62208 Jan 15 01:09:01 host sshd[14697]: input_userauth_request: invalid user admin [preauth] Jan 15 01:09:01 host sshd[14697]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:09:01 host sshd[14697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.153.72.137 Jan 15 01:09:03 host sshd[14697]: Failed password for invalid user admin from 221.153.72.137 port 62208 ssh2 Jan 15 01:09:03 host sshd[14697]: Failed password for invalid user admin from 221.153.72.137 port 62208 ssh2 Jan 15 01:09:04 host sshd[14697]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:09:06 host sshd[14697]: Failed password for invalid user admin from 221.153.72.137 port 62208 ssh2 Jan 15 01:09:06 host sshd[14697]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:09:08 host sshd[14697]: Failed password for invalid user admin from 221.153.72.137 port 62208 ssh2 Jan 15 01:09:09 host sshd[14697]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:09:11 host sshd[14697]: Failed password for invalid user admin from 221.153.72.137 port 62208 ssh2 Jan 15 01:09:26 host sshd[14886]: User root from 122.117.90.142 not allowed because not listed in AllowUsers Jan 15 01:09:26 host sshd[14886]: input_userauth_request: invalid user root [preauth] Jan 15 01:09:26 host unix_chkpwd[14891]: password check failed for user (root) Jan 15 01:09:26 host sshd[14886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.90.142 user=root Jan 15 01:09:26 host sshd[14886]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 01:09:28 host sshd[14886]: Failed password for invalid user root from 122.117.90.142 port 44733 ssh2 Jan 15 01:09:28 host unix_chkpwd[14918]: password check failed for user (root) Jan 15 01:09:28 host sshd[14886]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 01:09:30 host sshd[14886]: Failed password for invalid user root from 122.117.90.142 port 44733 ssh2 Jan 15 01:09:30 host sshd[14886]: Connection reset by 122.117.90.142 port 44733 [preauth] Jan 15 01:09:30 host sshd[14886]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.90.142 user=root Jan 15 01:12:38 host sshd[15288]: Invalid user user from 210.64.73.126 port 38105 Jan 15 01:12:38 host sshd[15288]: input_userauth_request: invalid user user [preauth] Jan 15 01:12:38 host sshd[15288]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:12:38 host sshd[15288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.64.73.126 Jan 15 01:12:40 host sshd[15288]: Failed password for invalid user user from 210.64.73.126 port 38105 ssh2 Jan 15 01:12:41 host sshd[15288]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:12:43 host sshd[15288]: Failed password for invalid user user from 210.64.73.126 port 38105 ssh2 Jan 15 01:12:44 host sshd[15288]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:12:47 host sshd[15288]: Failed password for invalid user user from 210.64.73.126 port 38105 ssh2 Jan 15 01:12:47 host sshd[15288]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:12:49 host sshd[15288]: Failed password for invalid user user from 210.64.73.126 port 38105 ssh2 Jan 15 01:12:50 host sshd[15288]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:12:53 host sshd[15288]: Failed password for invalid user user from 210.64.73.126 port 38105 ssh2 Jan 15 01:17:59 host sshd[16027]: User root from 114.35.63.12 not allowed because not listed in AllowUsers Jan 15 01:17:59 host sshd[16027]: input_userauth_request: invalid user root [preauth] Jan 15 01:17:59 host unix_chkpwd[16034]: password check failed for user (root) Jan 15 01:17:59 host sshd[16027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.63.12 user=root Jan 15 01:17:59 host sshd[16027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 01:18:01 host sshd[16027]: Failed password for invalid user root from 114.35.63.12 port 50364 ssh2 Jan 15 01:18:02 host unix_chkpwd[16055]: password check failed for user (root) Jan 15 01:18:02 host sshd[16027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 01:18:04 host sshd[16027]: Failed password for invalid user root from 114.35.63.12 port 50364 ssh2 Jan 15 01:18:06 host unix_chkpwd[16059]: password check failed for user (root) Jan 15 01:18:06 host sshd[16027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 01:18:08 host sshd[16027]: Failed password for invalid user root from 114.35.63.12 port 50364 ssh2 Jan 15 01:18:09 host unix_chkpwd[16068]: password check failed for user (root) Jan 15 01:18:09 host sshd[16027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 01:18:11 host sshd[16027]: Failed password for invalid user root from 114.35.63.12 port 50364 ssh2 Jan 15 01:21:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 01:21:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 01:21:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=wwwtestugo user-3=shalinijames user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=remysagr user-8=disposeat user-9=wwwkmaorg user-10=mrsclean user-11=wwwnexidigital user-12=kottayamcalldriv user-13=phmetals user-14=gifterman user-15=palco123 user-16=straightcurve user-17=wwwletsstalkfood user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 01:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GhGNVl8Ey4gj4T8e.~ Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GhGNVl8Ey4gj4T8e.~' Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GhGNVl8Ey4gj4T8e.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 01:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 01:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 01:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 01:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 01:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 01:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 01:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 01:23:29 host sshd[17526]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 15 01:23:29 host sshd[17526]: input_userauth_request: invalid user root [preauth] Jan 15 01:23:29 host unix_chkpwd[17550]: password check failed for user (root) Jan 15 01:23:29 host sshd[17526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 15 01:23:29 host sshd[17526]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 01:23:31 host sshd[17526]: Failed password for invalid user root from 194.169.175.102 port 57406 ssh2 Jan 15 01:23:31 host sshd[17526]: Received disconnect from 194.169.175.102 port 57406:11: Client disconnecting normally [preauth] Jan 15 01:23:31 host sshd[17526]: Disconnected from 194.169.175.102 port 57406 [preauth] Jan 15 01:25:24 host sshd[17724]: Connection closed by 162.142.125.220 port 40894 [preauth] Jan 15 01:27:31 host sshd[18104]: Invalid user haoxian from 168.138.156.147 port 42080 Jan 15 01:27:31 host sshd[18104]: input_userauth_request: invalid user haoxian [preauth] Jan 15 01:27:31 host sshd[18104]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:27:31 host sshd[18104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.156.147 Jan 15 01:27:33 host sshd[18104]: Failed password for invalid user haoxian from 168.138.156.147 port 42080 ssh2 Jan 15 01:27:33 host sshd[18104]: Received disconnect from 168.138.156.147 port 42080:11: Bye Bye [preauth] Jan 15 01:27:33 host sshd[18104]: Disconnected from 168.138.156.147 port 42080 [preauth] Jan 15 01:28:31 host sshd[18213]: Invalid user lingyuxia from 103.163.159.4 port 18396 Jan 15 01:28:31 host sshd[18213]: input_userauth_request: invalid user lingyuxia [preauth] Jan 15 01:28:31 host sshd[18213]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:28:31 host sshd[18213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.159.4 Jan 15 01:28:33 host sshd[18213]: Failed password for invalid user lingyuxia from 103.163.159.4 port 18396 ssh2 Jan 15 01:28:33 host sshd[18213]: Received disconnect from 103.163.159.4 port 18396:11: Bye Bye [preauth] Jan 15 01:28:33 host sshd[18213]: Disconnected from 103.163.159.4 port 18396 [preauth] Jan 15 01:28:42 host sshd[18227]: Invalid user wangqiang from 62.84.125.211 port 33754 Jan 15 01:28:42 host sshd[18227]: input_userauth_request: invalid user wangqiang [preauth] Jan 15 01:28:42 host sshd[18227]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:28:42 host sshd[18227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.125.211 Jan 15 01:28:44 host sshd[18227]: Failed password for invalid user wangqiang from 62.84.125.211 port 33754 ssh2 Jan 15 01:28:44 host sshd[18227]: Received disconnect from 62.84.125.211 port 33754:11: Bye Bye [preauth] Jan 15 01:28:44 host sshd[18227]: Disconnected from 62.84.125.211 port 33754 [preauth] Jan 15 01:28:53 host sshd[18239]: Invalid user wangguizhi from 91.93.63.187 port 37678 Jan 15 01:28:53 host sshd[18239]: input_userauth_request: invalid user wangguizhi [preauth] Jan 15 01:28:53 host sshd[18239]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:28:53 host sshd[18239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.93.63.187 Jan 15 01:28:56 host sshd[18239]: Failed password for invalid user wangguizhi from 91.93.63.187 port 37678 ssh2 Jan 15 01:28:56 host sshd[18239]: Received disconnect from 91.93.63.187 port 37678:11: Bye Bye [preauth] Jan 15 01:28:56 host sshd[18239]: Disconnected from 91.93.63.187 port 37678 [preauth] Jan 15 01:31:35 host sshd[18527]: Invalid user banana from 213.215.140.6 port 36610 Jan 15 01:31:35 host sshd[18527]: input_userauth_request: invalid user banana [preauth] Jan 15 01:31:35 host sshd[18527]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:31:35 host sshd[18527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.215.140.6 Jan 15 01:31:37 host sshd[18527]: Failed password for invalid user banana from 213.215.140.6 port 36610 ssh2 Jan 15 01:31:37 host sshd[18527]: Received disconnect from 213.215.140.6 port 36610:11: Bye Bye [preauth] Jan 15 01:31:37 host sshd[18527]: Disconnected from 213.215.140.6 port 36610 [preauth] Jan 15 01:31:53 host sshd[18544]: Invalid user buzhidao from 43.155.187.250 port 55070 Jan 15 01:31:53 host sshd[18544]: input_userauth_request: invalid user buzhidao [preauth] Jan 15 01:31:53 host sshd[18544]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:31:53 host sshd[18544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.187.250 Jan 15 01:31:54 host sshd[18547]: Invalid user maxs from 80.68.7.179 port 58888 Jan 15 01:31:54 host sshd[18547]: input_userauth_request: invalid user maxs [preauth] Jan 15 01:31:54 host sshd[18547]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:31:54 host sshd[18547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.179 Jan 15 01:31:55 host sshd[18544]: Failed password for invalid user buzhidao from 43.155.187.250 port 55070 ssh2 Jan 15 01:31:55 host sshd[18544]: Received disconnect from 43.155.187.250 port 55070:11: Bye Bye [preauth] Jan 15 01:31:55 host sshd[18544]: Disconnected from 43.155.187.250 port 55070 [preauth] Jan 15 01:31:56 host sshd[18547]: Failed password for invalid user maxs from 80.68.7.179 port 58888 ssh2 Jan 15 01:31:56 host sshd[18547]: Received disconnect from 80.68.7.179 port 58888:11: Bye Bye [preauth] Jan 15 01:31:56 host sshd[18547]: Disconnected from 80.68.7.179 port 58888 [preauth] Jan 15 01:33:08 host sshd[18661]: Invalid user wangqiang from 168.138.156.147 port 51936 Jan 15 01:33:08 host sshd[18661]: input_userauth_request: invalid user wangqiang [preauth] Jan 15 01:33:08 host sshd[18661]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:33:08 host sshd[18661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.156.147 Jan 15 01:33:10 host sshd[18661]: Failed password for invalid user wangqiang from 168.138.156.147 port 51936 ssh2 Jan 15 01:33:10 host sshd[18661]: Received disconnect from 168.138.156.147 port 51936:11: Bye Bye [preauth] Jan 15 01:33:10 host sshd[18661]: Disconnected from 168.138.156.147 port 51936 [preauth] Jan 15 01:33:42 host sshd[18742]: Invalid user nicholasdanks from 91.93.63.187 port 46644 Jan 15 01:33:42 host sshd[18742]: input_userauth_request: invalid user nicholasdanks [preauth] Jan 15 01:33:42 host sshd[18742]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:33:42 host sshd[18742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.93.63.187 Jan 15 01:33:43 host sshd[18742]: Failed password for invalid user nicholasdanks from 91.93.63.187 port 46644 ssh2 Jan 15 01:33:43 host sshd[18742]: Received disconnect from 91.93.63.187 port 46644:11: Bye Bye [preauth] Jan 15 01:33:43 host sshd[18742]: Disconnected from 91.93.63.187 port 46644 [preauth] Jan 15 01:33:45 host sshd[18751]: Invalid user tianxia from 213.215.140.6 port 38228 Jan 15 01:33:45 host sshd[18751]: input_userauth_request: invalid user tianxia [preauth] Jan 15 01:33:45 host sshd[18751]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:33:45 host sshd[18751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.215.140.6 Jan 15 01:33:46 host sshd[18792]: Invalid user maxs from 62.84.125.211 port 45002 Jan 15 01:33:46 host sshd[18792]: input_userauth_request: invalid user maxs [preauth] Jan 15 01:33:46 host sshd[18792]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:33:46 host sshd[18792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.125.211 Jan 15 01:33:47 host sshd[18751]: Failed password for invalid user tianxia from 213.215.140.6 port 38228 ssh2 Jan 15 01:33:47 host sshd[18751]: Received disconnect from 213.215.140.6 port 38228:11: Bye Bye [preauth] Jan 15 01:33:47 host sshd[18751]: Disconnected from 213.215.140.6 port 38228 [preauth] Jan 15 01:33:48 host sshd[18792]: Failed password for invalid user maxs from 62.84.125.211 port 45002 ssh2 Jan 15 01:33:48 host sshd[18792]: Received disconnect from 62.84.125.211 port 45002:11: Bye Bye [preauth] Jan 15 01:33:48 host sshd[18792]: Disconnected from 62.84.125.211 port 45002 [preauth] Jan 15 01:34:15 host sshd[18896]: Invalid user soumyaray from 80.68.7.179 port 35206 Jan 15 01:34:15 host sshd[18896]: input_userauth_request: invalid user soumyaray [preauth] Jan 15 01:34:15 host sshd[18896]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:34:15 host sshd[18896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.179 Jan 15 01:34:17 host sshd[18896]: Failed password for invalid user soumyaray from 80.68.7.179 port 35206 ssh2 Jan 15 01:34:17 host sshd[18896]: Received disconnect from 80.68.7.179 port 35206:11: Bye Bye [preauth] Jan 15 01:34:17 host sshd[18896]: Disconnected from 80.68.7.179 port 35206 [preauth] Jan 15 01:34:42 host sshd[18976]: Invalid user mingtian from 43.155.187.250 port 59976 Jan 15 01:34:42 host sshd[18976]: input_userauth_request: invalid user mingtian [preauth] Jan 15 01:34:42 host sshd[18976]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:34:42 host sshd[18976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.187.250 Jan 15 01:34:43 host sshd[18987]: Invalid user bimo from 168.138.156.147 port 38020 Jan 15 01:34:43 host sshd[18987]: input_userauth_request: invalid user bimo [preauth] Jan 15 01:34:43 host sshd[18987]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:34:43 host sshd[18987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.156.147 Jan 15 01:34:44 host sshd[18976]: Failed password for invalid user mingtian from 43.155.187.250 port 59976 ssh2 Jan 15 01:34:44 host sshd[18976]: Received disconnect from 43.155.187.250 port 59976:11: Bye Bye [preauth] Jan 15 01:34:44 host sshd[18976]: Disconnected from 43.155.187.250 port 59976 [preauth] Jan 15 01:34:45 host sshd[18990]: Invalid user hahaha from 213.215.140.6 port 60730 Jan 15 01:34:45 host sshd[18990]: input_userauth_request: invalid user hahaha [preauth] Jan 15 01:34:45 host sshd[18990]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:34:45 host sshd[18990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.215.140.6 Jan 15 01:34:45 host sshd[18987]: Failed password for invalid user bimo from 168.138.156.147 port 38020 ssh2 Jan 15 01:34:45 host sshd[18987]: Received disconnect from 168.138.156.147 port 38020:11: Bye Bye [preauth] Jan 15 01:34:45 host sshd[18987]: Disconnected from 168.138.156.147 port 38020 [preauth] Jan 15 01:34:47 host sshd[18990]: Failed password for invalid user hahaha from 213.215.140.6 port 60730 ssh2 Jan 15 01:34:47 host sshd[18990]: Received disconnect from 213.215.140.6 port 60730:11: Bye Bye [preauth] Jan 15 01:34:47 host sshd[18990]: Disconnected from 213.215.140.6 port 60730 [preauth] Jan 15 01:34:47 host sshd[18994]: Invalid user xinqiao from 91.93.63.187 port 45302 Jan 15 01:34:47 host sshd[18994]: input_userauth_request: invalid user xinqiao [preauth] Jan 15 01:34:47 host sshd[18994]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:34:47 host sshd[18994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.93.63.187 Jan 15 01:34:49 host sshd[18994]: Failed password for invalid user xinqiao from 91.93.63.187 port 45302 ssh2 Jan 15 01:34:49 host sshd[18994]: Received disconnect from 91.93.63.187 port 45302:11: Bye Bye [preauth] Jan 15 01:34:49 host sshd[18994]: Disconnected from 91.93.63.187 port 45302 [preauth] Jan 15 01:34:51 host sshd[19059]: Invalid user spongebob from 62.84.125.211 port 40472 Jan 15 01:34:51 host sshd[19059]: input_userauth_request: invalid user spongebob [preauth] Jan 15 01:34:51 host sshd[19059]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:34:51 host sshd[19059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.125.211 Jan 15 01:34:53 host sshd[19059]: Failed password for invalid user spongebob from 62.84.125.211 port 40472 ssh2 Jan 15 01:35:36 host sshd[19266]: Invalid user xinqiao from 80.68.7.179 port 33922 Jan 15 01:35:36 host sshd[19266]: input_userauth_request: invalid user xinqiao [preauth] Jan 15 01:35:36 host sshd[19266]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:35:36 host sshd[19266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.179 Jan 15 01:35:38 host sshd[19266]: Failed password for invalid user xinqiao from 80.68.7.179 port 33922 ssh2 Jan 15 01:35:38 host sshd[19269]: Invalid user emily from 103.163.159.4 port 49332 Jan 15 01:35:38 host sshd[19269]: input_userauth_request: invalid user emily [preauth] Jan 15 01:35:38 host sshd[19269]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:35:38 host sshd[19269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.159.4 Jan 15 01:35:40 host sshd[19269]: Failed password for invalid user emily from 103.163.159.4 port 49332 ssh2 Jan 15 01:35:41 host sshd[19269]: Received disconnect from 103.163.159.4 port 49332:11: Bye Bye [preauth] Jan 15 01:35:41 host sshd[19269]: Disconnected from 103.163.159.4 port 49332 [preauth] Jan 15 01:35:57 host sshd[19327]: Invalid user zhangyi from 43.155.187.250 port 54684 Jan 15 01:35:57 host sshd[19327]: input_userauth_request: invalid user zhangyi [preauth] Jan 15 01:35:57 host sshd[19327]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:35:57 host sshd[19327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.187.250 Jan 15 01:35:59 host sshd[19327]: Failed password for invalid user zhangyi from 43.155.187.250 port 54684 ssh2 Jan 15 01:36:45 host sshd[19448]: Invalid user usr from 210.186.89.152 port 35384 Jan 15 01:36:45 host sshd[19448]: input_userauth_request: invalid user usr [preauth] Jan 15 01:36:45 host sshd[19448]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:36:45 host sshd[19448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.186.89.152 Jan 15 01:36:47 host sshd[19448]: Failed password for invalid user usr from 210.186.89.152 port 35384 ssh2 Jan 15 01:36:48 host sshd[19448]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:36:49 host sshd[19448]: Failed password for invalid user usr from 210.186.89.152 port 35384 ssh2 Jan 15 01:36:50 host sshd[19448]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:36:52 host sshd[19448]: Failed password for invalid user usr from 210.186.89.152 port 35384 ssh2 Jan 15 01:36:52 host sshd[19448]: Connection reset by 210.186.89.152 port 35384 [preauth] Jan 15 01:36:52 host sshd[19448]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.186.89.152 Jan 15 01:37:51 host sshd[19569]: Invalid user zhangxiulan from 103.163.159.4 port 45040 Jan 15 01:37:51 host sshd[19569]: input_userauth_request: invalid user zhangxiulan [preauth] Jan 15 01:37:51 host sshd[19569]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:37:51 host sshd[19569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.159.4 Jan 15 01:37:53 host sshd[19569]: Failed password for invalid user zhangxiulan from 103.163.159.4 port 45040 ssh2 Jan 15 01:44:56 host sshd[20573]: Connection closed by 159.203.240.17 port 37854 [preauth] Jan 15 01:51:56 host sshd[21707]: Invalid user admin from 14.45.72.99 port 38953 Jan 15 01:51:56 host sshd[21707]: input_userauth_request: invalid user admin [preauth] Jan 15 01:51:56 host sshd[21707]: pam_unix(sshd:auth): check pass; user unknown Jan 15 01:51:56 host sshd[21707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.45.72.99 Jan 15 01:51:58 host sshd[21707]: Failed password for invalid user admin from 14.45.72.99 port 38953 ssh2 Jan 15 01:52:00 host sshd[21707]: Failed password for invalid user admin from 14.45.72.99 port 38953 ssh2 Jan 15 01:52:01 host sshd[21707]: Connection reset by 14.45.72.99 port 38953 [preauth] Jan 15 02:07:32 host sshd[23962]: Invalid user ee from 194.110.203.109 port 47480 Jan 15 02:07:32 host sshd[23962]: input_userauth_request: invalid user ee [preauth] Jan 15 02:07:32 host sshd[23962]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:07:32 host sshd[23962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 02:07:34 host sshd[23962]: Failed password for invalid user ee from 194.110.203.109 port 47480 ssh2 Jan 15 02:07:37 host sshd[23962]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:07:39 host sshd[23962]: Failed password for invalid user ee from 194.110.203.109 port 47480 ssh2 Jan 15 02:07:42 host sshd[23962]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:07:44 host sshd[23962]: Failed password for invalid user ee from 194.110.203.109 port 47480 ssh2 Jan 15 02:07:47 host sshd[23962]: Connection closed by 194.110.203.109 port 47480 [preauth] Jan 15 02:07:47 host sshd[23962]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 02:12:55 host sshd[24667]: User root from 59.126.216.114 not allowed because not listed in AllowUsers Jan 15 02:12:55 host sshd[24667]: input_userauth_request: invalid user root [preauth] Jan 15 02:12:55 host unix_chkpwd[24670]: password check failed for user (root) Jan 15 02:12:55 host sshd[24667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.216.114 user=root Jan 15 02:12:55 host sshd[24667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:12:57 host sshd[24667]: Failed password for invalid user root from 59.126.216.114 port 48326 ssh2 Jan 15 02:12:58 host unix_chkpwd[24673]: password check failed for user (root) Jan 15 02:12:58 host sshd[24667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:13:00 host sshd[24667]: Failed password for invalid user root from 59.126.216.114 port 48326 ssh2 Jan 15 02:13:00 host unix_chkpwd[24676]: password check failed for user (root) Jan 15 02:13:00 host sshd[24667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:13:02 host sshd[24667]: Failed password for invalid user root from 59.126.216.114 port 48326 ssh2 Jan 15 02:13:03 host unix_chkpwd[24694]: password check failed for user (root) Jan 15 02:13:03 host sshd[24667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:13:05 host sshd[24667]: Failed password for invalid user root from 59.126.216.114 port 48326 ssh2 Jan 15 02:14:24 host sshd[24942]: Connection closed by 43.158.217.137 port 33490 [preauth] Jan 15 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 02:22:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=phmetals user-15=kottayamcalldriv user-16=palco123 user-17=gifterman user-18=wwwletsstalkfood user-19=straightcurve user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=shalinijames user-24=wwwtestugo user-25=vfmassets user-26=wwwkapin user-27=woodpeck user-28=wwwkmaorg user-29=disposeat user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 02:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-H9GIZRZ94onuGRGZ.~ Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-H9GIZRZ94onuGRGZ.~' Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-H9GIZRZ94onuGRGZ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 02:22:02 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 02:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:28:05 host sshd[26816]: Did not receive identification string from 92.205.165.95 port 46888 Jan 15 02:28:06 host sshd[26817]: Invalid user oracle from 92.205.165.95 port 47062 Jan 15 02:28:06 host sshd[26817]: input_userauth_request: invalid user oracle [preauth] Jan 15 02:28:06 host sshd[26818]: Invalid user ec2-user from 92.205.165.95 port 47064 Jan 15 02:28:06 host sshd[26818]: input_userauth_request: invalid user ec2-user [preauth] Jan 15 02:28:06 host sshd[26821]: Invalid user dev from 92.205.165.95 port 47066 Jan 15 02:28:06 host sshd[26821]: input_userauth_request: invalid user dev [preauth] Jan 15 02:28:06 host sshd[26817]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:28:06 host sshd[26817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.205.165.95 Jan 15 02:28:06 host sshd[26818]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:28:06 host sshd[26818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.205.165.95 Jan 15 02:28:06 host sshd[26821]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:28:06 host sshd[26821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.205.165.95 Jan 15 02:28:08 host sshd[26817]: Failed password for invalid user oracle from 92.205.165.95 port 47062 ssh2 Jan 15 02:28:08 host sshd[26818]: Failed password for invalid user ec2-user from 92.205.165.95 port 47064 ssh2 Jan 15 02:28:08 host sshd[26817]: Connection closed by 92.205.165.95 port 47062 [preauth] Jan 15 02:28:08 host sshd[26821]: Failed password for invalid user dev from 92.205.165.95 port 47066 ssh2 Jan 15 02:28:08 host sshd[26818]: Connection closed by 92.205.165.95 port 47064 [preauth] Jan 15 02:28:08 host sshd[26821]: Connection closed by 92.205.165.95 port 47066 [preauth] Jan 15 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=straightcurve user-4=wwwletsstalkfood user-5=phmetals user-6=kottayamcalldriv user-7=palco123 user-8=gifterman user-9=wwwnexidigital user-10=mrsclean user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=keralaholi user-24=wwwresourcehunte user-25=wwwrmswll user-26=cochintaxi user-27=wwwkaretakers user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 02:29:59 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 15 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:30:08 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 15 02:30:08 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 15 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 15 02:30:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 15 02:30:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 15 02:30:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:30:23 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 15 02:30:23 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 15 02:30:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 15 02:30:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 15 02:30:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 15 02:30:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 15 02:30:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 15 02:30:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:34 host sshd[27338]: Invalid user vadmin from 122.116.192.145 port 44331 Jan 15 02:30:34 host sshd[27338]: input_userauth_request: invalid user vadmin [preauth] Jan 15 02:30:34 host sshd[27338]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:30:34 host sshd[27338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.192.145 Jan 15 02:30:36 host sshd[27338]: Failed password for invalid user vadmin from 122.116.192.145 port 44331 ssh2 Jan 15 02:30:38 host sshd[27338]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:30:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 15 02:30:39 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:39 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:40 host sshd[27338]: Failed password for invalid user vadmin from 122.116.192.145 port 44331 ssh2 Jan 15 02:30:41 host sshd[27338]: Failed password for invalid user vadmin from 122.116.192.145 port 44331 ssh2 Jan 15 02:30:41 host sshd[27338]: Connection closed by 122.116.192.145 port 44331 [preauth] Jan 15 02:30:41 host sshd[27338]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.192.145 Jan 15 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 15 02:30:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 15 02:30:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 15 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 15 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 15 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:30:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 15 02:30:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 15 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 15 02:30:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 15 02:30:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:30:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 15 02:30:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:30:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:31:00 host sshd[27678]: Invalid user ubuntu from 195.226.194.142 port 61210 Jan 15 02:31:00 host sshd[27678]: input_userauth_request: invalid user ubuntu [preauth] Jan 15 02:31:00 host sshd[27678]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:31:00 host sshd[27678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 15 02:31:02 host sshd[27678]: Failed password for invalid user ubuntu from 195.226.194.142 port 61210 ssh2 Jan 15 02:31:02 host sshd[27678]: Received disconnect from 195.226.194.142 port 61210:11: Bye Bye [preauth] Jan 15 02:31:02 host sshd[27678]: Disconnected from 195.226.194.142 port 61210 [preauth] Jan 15 02:31:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 15 02:31:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:31:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:31:07 host sshd[27755]: Invalid user zyfwp from 175.205.109.196 port 48760 Jan 15 02:31:07 host sshd[27755]: input_userauth_request: invalid user zyfwp [preauth] Jan 15 02:31:07 host sshd[27755]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:31:07 host sshd[27755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.205.109.196 Jan 15 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 15 02:31:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:31:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:31:09 host sshd[27755]: Failed password for invalid user zyfwp from 175.205.109.196 port 48760 ssh2 Jan 15 02:31:10 host sshd[27849]: Invalid user user from 61.63.228.122 port 45877 Jan 15 02:31:10 host sshd[27849]: input_userauth_request: invalid user user [preauth] Jan 15 02:31:10 host sshd[27849]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:31:10 host sshd[27849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.63.228.122 Jan 15 02:31:10 host sshd[27755]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:31:11 host sshd[27849]: Failed password for invalid user user from 61.63.228.122 port 45877 ssh2 Jan 15 02:31:11 host sshd[27849]: Connection reset by 61.63.228.122 port 45877 [preauth] Jan 15 02:31:11 host sshd[27755]: Failed password for invalid user zyfwp from 175.205.109.196 port 48760 ssh2 Jan 15 02:31:14 host sshd[27755]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:31:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 15 02:31:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 15 02:31:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 15 02:31:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:31:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:31:15 host sshd[27755]: Failed password for invalid user zyfwp from 175.205.109.196 port 48760 ssh2 Jan 15 02:31:15 host sshd[27755]: Connection reset by 175.205.109.196 port 48760 [preauth] Jan 15 02:31:15 host sshd[27755]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.205.109.196 Jan 15 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 15 02:31:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:31:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 15 02:31:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:31:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 15 02:31:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:31:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:31:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 15 02:31:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 15 02:31:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 15 02:31:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:31:37 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:31:46 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 15 02:31:46 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 15 02:31:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 15 02:31:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:31:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 15 02:31:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:31:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 15 02:31:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 15 02:32:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:32:00 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 02:32:00 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 15 02:32:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:32:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 02:32:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 15 02:32:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:32:24 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 02:32:24 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 15 02:32:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 15 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 15 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 15 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:32:32 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 15 02:32:33 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 15 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 15 02:32:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 15 02:32:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:39 host sshd[29292]: Invalid user admin from 122.117.22.83 port 56508 Jan 15 02:32:39 host sshd[29292]: input_userauth_request: invalid user admin [preauth] Jan 15 02:32:39 host sshd[29292]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:32:39 host sshd[29292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.22.83 Jan 15 02:32:41 host sshd[29292]: Failed password for invalid user admin from 122.117.22.83 port 56508 ssh2 Jan 15 02:32:41 host sshd[29292]: Failed password for invalid user admin from 122.117.22.83 port 56508 ssh2 Jan 15 02:32:42 host sshd[29292]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:32:44 host sshd[29292]: Failed password for invalid user admin from 122.117.22.83 port 56508 ssh2 Jan 15 02:32:45 host sshd[29292]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:32:46 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 15 02:32:46 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 15 02:32:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 15 02:32:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:47 host sshd[29292]: Failed password for invalid user admin from 122.117.22.83 port 56508 ssh2 Jan 15 02:32:48 host sshd[29292]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 15 02:32:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 15 02:32:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:32:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:32:50 host sshd[29292]: Failed password for invalid user admin from 122.117.22.83 port 56508 ssh2 Jan 15 02:33:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 15 02:33:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 15 02:33:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 15 02:33:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 15 02:33:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 15 02:33:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 15 02:33:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 15 02:33:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 15 02:33:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 15 02:33:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "SiteOrigin Widgets Bundle" on (http://ugotechnologies.com/old). Installed version: 1.8.1. Available version: 1.46.2.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 Jan 15 02:33:24 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in Jan 15 02:33:24 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error Jan 15 02:33:24 host sudo: wp-toolkit : (command continued) establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: [error]FailedToExecuteWpCliCommand: chdir /home/woodpeck/public_html/wp: no such file or directory[/error]#012<br/><br/>' --output=json Jan 15 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 15 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 15 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 15 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 15 02:33:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:33:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:33:37 host sshd[30242]: Connection reset by 183.109.112.160 port 61548 [preauth] Jan 15 02:35:58 host sshd[30514]: User root from 87.14.52.123 not allowed because not listed in AllowUsers Jan 15 02:35:58 host sshd[30514]: input_userauth_request: invalid user root [preauth] Jan 15 02:35:58 host unix_chkpwd[30517]: password check failed for user (root) Jan 15 02:35:58 host sshd[30514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.14.52.123 user=root Jan 15 02:35:58 host sshd[30514]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:36:00 host sshd[30514]: Failed password for invalid user root from 87.14.52.123 port 55009 ssh2 Jan 15 02:36:01 host unix_chkpwd[30521]: password check failed for user (root) Jan 15 02:36:01 host sshd[30514]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:36:03 host sshd[30514]: Failed password for invalid user root from 87.14.52.123 port 55009 ssh2 Jan 15 02:36:03 host unix_chkpwd[30534]: password check failed for user (root) Jan 15 02:36:03 host sshd[30514]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:36:05 host sshd[30514]: Failed password for invalid user root from 87.14.52.123 port 55009 ssh2 Jan 15 02:36:06 host unix_chkpwd[30537]: password check failed for user (root) Jan 15 02:36:06 host sshd[30514]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:36:07 host sshd[30514]: Failed password for invalid user root from 87.14.52.123 port 55009 ssh2 Jan 15 02:36:07 host unix_chkpwd[30540]: password check failed for user (root) Jan 15 02:36:07 host sshd[30514]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:36:09 host sshd[30514]: Failed password for invalid user root from 87.14.52.123 port 55009 ssh2 Jan 15 02:36:09 host unix_chkpwd[30552]: password check failed for user (root) Jan 15 02:36:09 host sshd[30514]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:36:11 host sshd[30514]: Failed password for invalid user root from 87.14.52.123 port 55009 ssh2 Jan 15 02:36:11 host sshd[30514]: error: maximum authentication attempts exceeded for invalid user root from 87.14.52.123 port 55009 ssh2 [preauth] Jan 15 02:36:11 host sshd[30514]: Disconnecting: Too many authentication failures [preauth] Jan 15 02:36:11 host sshd[30514]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.14.52.123 user=root Jan 15 02:36:11 host sshd[30514]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 15 02:36:43 host sshd[30644]: User ftp from 101.191.143.212 not allowed because not listed in AllowUsers Jan 15 02:36:43 host sshd[30644]: input_userauth_request: invalid user ftp [preauth] Jan 15 02:36:43 host unix_chkpwd[30647]: password check failed for user (ftp) Jan 15 02:36:43 host sshd[30644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.191.143.212 user=ftp Jan 15 02:36:43 host sshd[30644]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 15 02:36:44 host sshd[30644]: Failed password for invalid user ftp from 101.191.143.212 port 33811 ssh2 Jan 15 02:36:45 host unix_chkpwd[30650]: password check failed for user (ftp) Jan 15 02:36:45 host sshd[30644]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 15 02:36:47 host sshd[30644]: Failed password for invalid user ftp from 101.191.143.212 port 33811 ssh2 Jan 15 02:36:48 host unix_chkpwd[30653]: password check failed for user (ftp) Jan 15 02:36:48 host sshd[30644]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 15 02:36:49 host sshd[30644]: Failed password for invalid user ftp from 101.191.143.212 port 33811 ssh2 Jan 15 02:36:50 host sshd[30644]: Failed password for invalid user ftp from 101.191.143.212 port 33811 ssh2 Jan 15 02:36:50 host unix_chkpwd[30656]: password check failed for user (ftp) Jan 15 02:36:50 host sshd[30644]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 15 02:36:52 host sshd[30644]: Failed password for invalid user ftp from 101.191.143.212 port 33811 ssh2 Jan 15 02:36:53 host unix_chkpwd[30660]: password check failed for user (ftp) Jan 15 02:36:53 host sshd[30644]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 15 02:36:55 host sshd[30644]: Failed password for invalid user ftp from 101.191.143.212 port 33811 ssh2 Jan 15 02:36:55 host sshd[30644]: error: maximum authentication attempts exceeded for invalid user ftp from 101.191.143.212 port 33811 ssh2 [preauth] Jan 15 02:36:55 host sshd[30644]: Disconnecting: Too many authentication failures [preauth] Jan 15 02:36:55 host sshd[30644]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.191.143.212 user=ftp Jan 15 02:36:55 host sshd[30644]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 15 02:41:38 host sshd[31372]: Invalid user admin from 49.213.219.196 port 36268 Jan 15 02:41:38 host sshd[31372]: input_userauth_request: invalid user admin [preauth] Jan 15 02:41:38 host sshd[31372]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:41:38 host sshd[31372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.219.196 Jan 15 02:41:40 host sshd[31372]: Failed password for invalid user admin from 49.213.219.196 port 36268 ssh2 Jan 15 02:41:41 host sshd[31372]: Failed password for invalid user admin from 49.213.219.196 port 36268 ssh2 Jan 15 02:41:41 host sshd[31372]: Connection reset by 49.213.219.196 port 36268 [preauth] Jan 15 02:42:26 host sshd[31441]: Invalid user admin from 114.34.141.56 port 52925 Jan 15 02:42:26 host sshd[31441]: input_userauth_request: invalid user admin [preauth] Jan 15 02:42:26 host sshd[31441]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:42:26 host sshd[31441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.141.56 Jan 15 02:42:28 host sshd[31441]: Failed password for invalid user admin from 114.34.141.56 port 52925 ssh2 Jan 15 02:42:29 host sshd[31441]: Failed password for invalid user admin from 114.34.141.56 port 52925 ssh2 Jan 15 02:42:29 host sshd[31441]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:42:31 host sshd[31441]: Failed password for invalid user admin from 114.34.141.56 port 52925 ssh2 Jan 15 02:42:32 host sshd[31441]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:42:33 host sshd[31441]: Failed password for invalid user admin from 114.34.141.56 port 52925 ssh2 Jan 15 02:42:34 host sshd[31441]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:42:36 host sshd[31441]: Failed password for invalid user admin from 114.34.141.56 port 52925 ssh2 Jan 15 02:44:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:44:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:44:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:44:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:44:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:44:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:44:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 02:44:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 02:49:03 host sshd[32412]: Invalid user wangxiumei from 220.117.232.74 port 53464 Jan 15 02:49:03 host sshd[32412]: input_userauth_request: invalid user wangxiumei [preauth] Jan 15 02:49:03 host sshd[32412]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:49:03 host sshd[32412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.232.74 Jan 15 02:49:05 host sshd[32412]: Failed password for invalid user wangxiumei from 220.117.232.74 port 53464 ssh2 Jan 15 02:49:05 host sshd[32412]: Received disconnect from 220.117.232.74 port 53464:11: Bye Bye [preauth] Jan 15 02:49:05 host sshd[32412]: Disconnected from 220.117.232.74 port 53464 [preauth] Jan 15 02:49:22 host sshd[32437]: Invalid user liuqian from 80.85.241.81 port 48410 Jan 15 02:49:22 host sshd[32437]: input_userauth_request: invalid user liuqian [preauth] Jan 15 02:49:22 host sshd[32437]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:49:22 host sshd[32437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.241.81 Jan 15 02:49:25 host sshd[32437]: Failed password for invalid user liuqian from 80.85.241.81 port 48410 ssh2 Jan 15 02:49:25 host sshd[32437]: Received disconnect from 80.85.241.81 port 48410:11: Bye Bye [preauth] Jan 15 02:49:25 host sshd[32437]: Disconnected from 80.85.241.81 port 48410 [preauth] Jan 15 02:50:46 host sshd[32620]: Invalid user lijianhua from 67.205.136.137 port 39986 Jan 15 02:50:46 host sshd[32620]: input_userauth_request: invalid user lijianhua [preauth] Jan 15 02:50:46 host sshd[32620]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:50:46 host sshd[32620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.136.137 Jan 15 02:50:48 host sshd[32620]: Failed password for invalid user lijianhua from 67.205.136.137 port 39986 ssh2 Jan 15 02:50:48 host sshd[32620]: Received disconnect from 67.205.136.137 port 39986:11: Bye Bye [preauth] Jan 15 02:50:48 host sshd[32620]: Disconnected from 67.205.136.137 port 39986 [preauth] Jan 15 02:51:14 host sshd[32663]: Invalid user anaconda from 165.22.180.87 port 51520 Jan 15 02:51:14 host sshd[32663]: input_userauth_request: invalid user anaconda [preauth] Jan 15 02:51:14 host sshd[32663]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:51:14 host sshd[32663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.180.87 Jan 15 02:51:16 host sshd[32663]: Failed password for invalid user anaconda from 165.22.180.87 port 51520 ssh2 Jan 15 02:51:17 host sshd[32663]: Received disconnect from 165.22.180.87 port 51520:11: Bye Bye [preauth] Jan 15 02:51:17 host sshd[32663]: Disconnected from 165.22.180.87 port 51520 [preauth] Jan 15 02:52:15 host sshd[413]: Invalid user gnats from 104.244.74.6 port 39920 Jan 15 02:52:15 host sshd[413]: input_userauth_request: invalid user gnats [preauth] Jan 15 02:52:15 host sshd[413]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:52:15 host sshd[413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 15 02:52:17 host sshd[413]: Failed password for invalid user gnats from 104.244.74.6 port 39920 ssh2 Jan 15 02:52:17 host sshd[413]: Connection closed by 104.244.74.6 port 39920 [preauth] Jan 15 02:55:04 host sshd[723]: Invalid user liuqian from 67.205.136.137 port 60410 Jan 15 02:55:04 host sshd[723]: input_userauth_request: invalid user liuqian [preauth] Jan 15 02:55:04 host sshd[723]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:55:04 host sshd[723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.136.137 Jan 15 02:55:07 host sshd[723]: Failed password for invalid user liuqian from 67.205.136.137 port 60410 ssh2 Jan 15 02:55:07 host sshd[723]: Received disconnect from 67.205.136.137 port 60410:11: Bye Bye [preauth] Jan 15 02:55:07 host sshd[723]: Disconnected from 67.205.136.137 port 60410 [preauth] Jan 15 02:55:19 host sshd[754]: Invalid user ekooistramanning from 165.22.180.87 port 54524 Jan 15 02:55:19 host sshd[754]: input_userauth_request: invalid user ekooistramanning [preauth] Jan 15 02:55:19 host sshd[754]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:55:19 host sshd[754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.180.87 Jan 15 02:55:21 host sshd[754]: Failed password for invalid user ekooistramanning from 165.22.180.87 port 54524 ssh2 Jan 15 02:55:21 host sshd[754]: Received disconnect from 165.22.180.87 port 54524:11: Bye Bye [preauth] Jan 15 02:55:21 host sshd[754]: Disconnected from 165.22.180.87 port 54524 [preauth] Jan 15 02:55:41 host sshd[1003]: Invalid user huyaxuan from 80.85.241.81 port 49024 Jan 15 02:55:41 host sshd[1003]: input_userauth_request: invalid user huyaxuan [preauth] Jan 15 02:55:41 host sshd[1003]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:55:41 host sshd[1003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.241.81 Jan 15 02:55:44 host sshd[1003]: Failed password for invalid user huyaxuan from 80.85.241.81 port 49024 ssh2 Jan 15 02:55:44 host sshd[1003]: Received disconnect from 80.85.241.81 port 49024:11: Bye Bye [preauth] Jan 15 02:55:44 host sshd[1003]: Disconnected from 80.85.241.81 port 49024 [preauth] Jan 15 02:56:02 host sshd[1235]: Invalid user wangqin from 200.170.151.30 port 32810 Jan 15 02:56:02 host sshd[1235]: input_userauth_request: invalid user wangqin [preauth] Jan 15 02:56:02 host sshd[1235]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:56:02 host sshd[1235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.170.151.30 Jan 15 02:56:05 host sshd[1235]: Failed password for invalid user wangqin from 200.170.151.30 port 32810 ssh2 Jan 15 02:56:05 host sshd[1235]: Received disconnect from 200.170.151.30 port 32810:11: Bye Bye [preauth] Jan 15 02:56:05 host sshd[1235]: Disconnected from 200.170.151.30 port 32810 [preauth] Jan 15 02:56:16 host sshd[1401]: Invalid user gnats from 104.244.74.6 port 53484 Jan 15 02:56:16 host sshd[1401]: input_userauth_request: invalid user gnats [preauth] Jan 15 02:56:16 host sshd[1401]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:56:16 host sshd[1401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 15 02:56:18 host sshd[1401]: Failed password for invalid user gnats from 104.244.74.6 port 53484 ssh2 Jan 15 02:56:19 host sshd[1401]: Connection closed by 104.244.74.6 port 53484 [preauth] Jan 15 02:56:22 host sshd[1453]: Invalid user mbaalouc from 165.22.180.87 port 43498 Jan 15 02:56:22 host sshd[1453]: input_userauth_request: invalid user mbaalouc [preauth] Jan 15 02:56:22 host sshd[1453]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:56:22 host sshd[1453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.180.87 Jan 15 02:56:23 host sshd[1453]: Failed password for invalid user mbaalouc from 165.22.180.87 port 43498 ssh2 Jan 15 02:56:24 host sshd[1453]: Received disconnect from 165.22.180.87 port 43498:11: Bye Bye [preauth] Jan 15 02:56:24 host sshd[1453]: Disconnected from 165.22.180.87 port 43498 [preauth] Jan 15 02:56:37 host sshd[1651]: Invalid user xunleili from 220.117.232.74 port 56356 Jan 15 02:56:37 host sshd[1651]: input_userauth_request: invalid user xunleili [preauth] Jan 15 02:56:37 host sshd[1651]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:56:37 host sshd[1651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.232.74 Jan 15 02:56:39 host sshd[1651]: Failed password for invalid user xunleili from 220.117.232.74 port 56356 ssh2 Jan 15 02:56:40 host sshd[1651]: Received disconnect from 220.117.232.74 port 56356:11: Bye Bye [preauth] Jan 15 02:56:40 host sshd[1651]: Disconnected from 220.117.232.74 port 56356 [preauth] Jan 15 02:56:45 host sshd[1731]: Invalid user xinqiao from 80.85.241.81 port 43492 Jan 15 02:56:45 host sshd[1731]: input_userauth_request: invalid user xinqiao [preauth] Jan 15 02:56:45 host sshd[1731]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:56:45 host sshd[1731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.241.81 Jan 15 02:56:47 host sshd[1731]: Failed password for invalid user xinqiao from 80.85.241.81 port 43492 ssh2 Jan 15 02:56:47 host sshd[1731]: Received disconnect from 80.85.241.81 port 43492:11: Bye Bye [preauth] Jan 15 02:56:47 host sshd[1731]: Disconnected from 80.85.241.81 port 43492 [preauth] Jan 15 02:57:21 host sshd[2160]: Invalid user zhangsicheng from 67.205.136.137 port 34324 Jan 15 02:57:21 host sshd[2160]: input_userauth_request: invalid user zhangsicheng [preauth] Jan 15 02:57:21 host sshd[2160]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:57:21 host sshd[2160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.136.137 Jan 15 02:57:23 host sshd[2160]: Failed password for invalid user zhangsicheng from 67.205.136.137 port 34324 ssh2 Jan 15 02:57:23 host sshd[2160]: Received disconnect from 67.205.136.137 port 34324:11: Bye Bye [preauth] Jan 15 02:57:23 host sshd[2160]: Disconnected from 67.205.136.137 port 34324 [preauth] Jan 15 02:57:52 host sshd[2554]: Invalid user lihui from 200.170.151.30 port 34318 Jan 15 02:57:52 host sshd[2554]: input_userauth_request: invalid user lihui [preauth] Jan 15 02:57:52 host sshd[2554]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:57:52 host sshd[2554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.170.151.30 Jan 15 02:57:54 host sshd[2554]: Failed password for invalid user lihui from 200.170.151.30 port 34318 ssh2 Jan 15 02:57:54 host sshd[2554]: Received disconnect from 200.170.151.30 port 34318:11: Bye Bye [preauth] Jan 15 02:57:54 host sshd[2554]: Disconnected from 200.170.151.30 port 34318 [preauth] Jan 15 02:57:59 host sshd[2597]: Invalid user apply from 220.117.232.74 port 50720 Jan 15 02:57:59 host sshd[2597]: input_userauth_request: invalid user apply [preauth] Jan 15 02:57:59 host sshd[2597]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:57:59 host sshd[2597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.232.74 Jan 15 02:58:01 host sshd[2597]: Failed password for invalid user apply from 220.117.232.74 port 50720 ssh2 Jan 15 02:59:19 host sshd[2941]: Invalid user mbaalouc from 200.170.151.30 port 33160 Jan 15 02:59:19 host sshd[2941]: input_userauth_request: invalid user mbaalouc [preauth] Jan 15 02:59:19 host sshd[2941]: pam_unix(sshd:auth): check pass; user unknown Jan 15 02:59:19 host sshd[2941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.170.151.30 Jan 15 02:59:21 host sshd[2941]: Failed password for invalid user mbaalouc from 200.170.151.30 port 33160 ssh2 Jan 15 02:59:53 host sshd[3028]: User root from 112.186.131.178 not allowed because not listed in AllowUsers Jan 15 02:59:53 host sshd[3028]: input_userauth_request: invalid user root [preauth] Jan 15 02:59:53 host unix_chkpwd[3034]: password check failed for user (root) Jan 15 02:59:53 host sshd[3028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.131.178 user=root Jan 15 02:59:53 host sshd[3028]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:59:55 host sshd[3028]: Failed password for invalid user root from 112.186.131.178 port 61529 ssh2 Jan 15 02:59:56 host unix_chkpwd[3040]: password check failed for user (root) Jan 15 02:59:56 host sshd[3028]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 02:59:58 host sshd[3028]: Failed password for invalid user root from 112.186.131.178 port 61529 ssh2 Jan 15 02:59:59 host unix_chkpwd[3046]: password check failed for user (root) Jan 15 02:59:59 host sshd[3028]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:00:01 host sshd[3028]: Failed password for invalid user root from 112.186.131.178 port 61529 ssh2 Jan 15 03:00:02 host sshd[3028]: Connection reset by 112.186.131.178 port 61529 [preauth] Jan 15 03:00:02 host sshd[3028]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.131.178 user=root Jan 15 03:10:59 host sshd[4463]: User root from 182.52.222.210 not allowed because not listed in AllowUsers Jan 15 03:10:59 host sshd[4463]: input_userauth_request: invalid user root [preauth] Jan 15 03:11:00 host unix_chkpwd[4470]: password check failed for user (root) Jan 15 03:11:00 host sshd[4463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.52.222.210 user=root Jan 15 03:11:00 host sshd[4463]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:11:02 host sshd[4463]: Failed password for invalid user root from 182.52.222.210 port 56155 ssh2 Jan 15 03:11:04 host unix_chkpwd[4492]: password check failed for user (root) Jan 15 03:11:04 host sshd[4463]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:11:06 host sshd[4463]: Failed password for invalid user root from 182.52.222.210 port 56155 ssh2 Jan 15 03:11:07 host unix_chkpwd[4496]: password check failed for user (root) Jan 15 03:11:07 host sshd[4463]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:11:09 host sshd[4463]: Failed password for invalid user root from 182.52.222.210 port 56155 ssh2 Jan 15 03:11:10 host sshd[4463]: Connection reset by 182.52.222.210 port 56155 [preauth] Jan 15 03:11:10 host sshd[4463]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.52.222.210 user=root Jan 15 03:11:35 host sshd[4589]: Invalid user ubnt from 175.202.137.75 port 62393 Jan 15 03:11:35 host sshd[4589]: input_userauth_request: invalid user ubnt [preauth] Jan 15 03:11:35 host sshd[4589]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:11:35 host sshd[4589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.202.137.75 Jan 15 03:11:37 host sshd[4589]: Failed password for invalid user ubnt from 175.202.137.75 port 62393 ssh2 Jan 15 03:11:38 host sshd[4589]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:11:40 host sshd[4589]: Failed password for invalid user ubnt from 175.202.137.75 port 62393 ssh2 Jan 15 03:11:40 host sshd[4589]: Failed password for invalid user ubnt from 175.202.137.75 port 62393 ssh2 Jan 15 03:11:43 host sshd[4589]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:11:45 host sshd[4589]: Failed password for invalid user ubnt from 175.202.137.75 port 62393 ssh2 Jan 15 03:11:46 host sshd[4589]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:11:47 host sshd[4589]: Failed password for invalid user ubnt from 175.202.137.75 port 62393 ssh2 Jan 15 03:16:18 host sshd[5278]: User root from 112.185.167.243 not allowed because not listed in AllowUsers Jan 15 03:16:18 host sshd[5278]: input_userauth_request: invalid user root [preauth] Jan 15 03:16:18 host unix_chkpwd[5283]: password check failed for user (root) Jan 15 03:16:18 host sshd[5278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.185.167.243 user=root Jan 15 03:16:18 host sshd[5278]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:16:21 host sshd[5278]: Failed password for invalid user root from 112.185.167.243 port 62050 ssh2 Jan 15 03:16:21 host unix_chkpwd[5290]: password check failed for user (root) Jan 15 03:16:21 host sshd[5278]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:16:23 host sshd[5278]: Failed password for invalid user root from 112.185.167.243 port 62050 ssh2 Jan 15 03:16:23 host sshd[5278]: Connection reset by 112.185.167.243 port 62050 [preauth] Jan 15 03:16:23 host sshd[5278]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.185.167.243 user=root Jan 15 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 03:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwrmswll user-10=keralaholi user-11=wwwresourcehunte user-12=remysagr user-13=disposeat user-14=wwwkmaorg user-15=woodpeck user-16=wwwkapin user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=phmetals user-26=kottayamcalldriv user-27=gifterman user-28=palco123 user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 03:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zsQrjocVIkne2Gag.~ Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zsQrjocVIkne2Gag.~' Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zsQrjocVIkne2Gag.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 03:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 03:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 03:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 03:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 03:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 03:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 03:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 03:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 03:25:36 host sshd[7357]: Invalid user admin from 125.229.200.69 port 32897 Jan 15 03:25:36 host sshd[7357]: input_userauth_request: invalid user admin [preauth] Jan 15 03:25:36 host sshd[7357]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:25:36 host sshd[7357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.200.69 Jan 15 03:25:38 host sshd[7357]: Failed password for invalid user admin from 125.229.200.69 port 32897 ssh2 Jan 15 03:25:39 host sshd[7357]: Failed password for invalid user admin from 125.229.200.69 port 32897 ssh2 Jan 15 03:25:39 host sshd[7357]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:25:42 host sshd[7357]: Failed password for invalid user admin from 125.229.200.69 port 32897 ssh2 Jan 15 03:25:42 host sshd[7357]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:25:45 host sshd[7357]: Failed password for invalid user admin from 125.229.200.69 port 32897 ssh2 Jan 15 03:25:45 host sshd[7357]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:25:48 host sshd[7357]: Failed password for invalid user admin from 125.229.200.69 port 32897 ssh2 Jan 15 03:26:18 host sshd[7495]: Invalid user gnats from 104.244.74.6 port 58318 Jan 15 03:26:18 host sshd[7495]: input_userauth_request: invalid user gnats [preauth] Jan 15 03:26:18 host sshd[7495]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:26:18 host sshd[7495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 15 03:26:20 host sshd[7495]: Failed password for invalid user gnats from 104.244.74.6 port 58318 ssh2 Jan 15 03:26:20 host sshd[7495]: Connection closed by 104.244.74.6 port 58318 [preauth] Jan 15 03:29:52 host sshd[8186]: Invalid user crl from 103.90.224.173 port 35280 Jan 15 03:29:52 host sshd[8186]: input_userauth_request: invalid user crl [preauth] Jan 15 03:29:52 host sshd[8186]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:29:52 host sshd[8186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.90.224.173 Jan 15 03:29:54 host sshd[8186]: Failed password for invalid user crl from 103.90.224.173 port 35280 ssh2 Jan 15 03:29:54 host sshd[8186]: Received disconnect from 103.90.224.173 port 35280:11: Bye Bye [preauth] Jan 15 03:29:54 host sshd[8186]: Disconnected from 103.90.224.173 port 35280 [preauth] Jan 15 03:34:40 host sshd[9144]: Invalid user dlturmen from 103.90.224.173 port 56254 Jan 15 03:34:40 host sshd[9144]: input_userauth_request: invalid user dlturmen [preauth] Jan 15 03:34:40 host sshd[9144]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:34:40 host sshd[9144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.90.224.173 Jan 15 03:34:42 host sshd[9144]: Failed password for invalid user dlturmen from 103.90.224.173 port 56254 ssh2 Jan 15 03:34:42 host sshd[9144]: Received disconnect from 103.90.224.173 port 56254:11: Bye Bye [preauth] Jan 15 03:34:42 host sshd[9144]: Disconnected from 103.90.224.173 port 56254 [preauth] Jan 15 03:36:16 host sshd[9445]: Invalid user mcbserver from 103.90.224.173 port 55248 Jan 15 03:36:16 host sshd[9445]: input_userauth_request: invalid user mcbserver [preauth] Jan 15 03:36:16 host sshd[9445]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:36:16 host sshd[9445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.90.224.173 Jan 15 03:36:18 host sshd[9445]: Failed password for invalid user mcbserver from 103.90.224.173 port 55248 ssh2 Jan 15 03:37:24 host sshd[9760]: Invalid user yuze from 190.138.240.31 port 41530 Jan 15 03:37:24 host sshd[9760]: input_userauth_request: invalid user yuze [preauth] Jan 15 03:37:24 host sshd[9760]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:37:24 host sshd[9760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.138.240.31 Jan 15 03:37:25 host sshd[9760]: Failed password for invalid user yuze from 190.138.240.31 port 41530 ssh2 Jan 15 03:37:26 host sshd[9760]: Received disconnect from 190.138.240.31 port 41530:11: Bye Bye [preauth] Jan 15 03:37:26 host sshd[9760]: Disconnected from 190.138.240.31 port 41530 [preauth] Jan 15 03:38:29 host sshd[9964]: User root from 1.165.209.113 not allowed because not listed in AllowUsers Jan 15 03:38:29 host sshd[9964]: input_userauth_request: invalid user root [preauth] Jan 15 03:38:29 host unix_chkpwd[9992]: password check failed for user (root) Jan 15 03:38:29 host sshd[9964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.165.209.113 user=root Jan 15 03:38:29 host sshd[9964]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:38:31 host sshd[9964]: Failed password for invalid user root from 1.165.209.113 port 54498 ssh2 Jan 15 03:38:32 host unix_chkpwd[10004]: password check failed for user (root) Jan 15 03:38:32 host sshd[9964]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:38:33 host sshd[9964]: Failed password for invalid user root from 1.165.209.113 port 54498 ssh2 Jan 15 03:38:34 host sshd[9964]: Connection reset by 1.165.209.113 port 54498 [preauth] Jan 15 03:38:34 host sshd[9964]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.165.209.113 user=root Jan 15 03:40:20 host sshd[10568]: Invalid user jaylee from 177.93.51.98 port 53656 Jan 15 03:40:20 host sshd[10568]: input_userauth_request: invalid user jaylee [preauth] Jan 15 03:40:20 host sshd[10568]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:40:20 host sshd[10568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.93.51.98 Jan 15 03:40:22 host sshd[10568]: Failed password for invalid user jaylee from 177.93.51.98 port 53656 ssh2 Jan 15 03:40:23 host sshd[10568]: Received disconnect from 177.93.51.98 port 53656:11: Bye Bye [preauth] Jan 15 03:40:23 host sshd[10568]: Disconnected from 177.93.51.98 port 53656 [preauth] Jan 15 03:42:59 host sshd[11222]: Invalid user adsadmin from 157.230.6.213 port 41150 Jan 15 03:42:59 host sshd[11222]: input_userauth_request: invalid user adsadmin [preauth] Jan 15 03:42:59 host sshd[11222]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:42:59 host sshd[11222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.6.213 Jan 15 03:43:02 host sshd[11222]: Failed password for invalid user adsadmin from 157.230.6.213 port 41150 ssh2 Jan 15 03:43:02 host sshd[11222]: Received disconnect from 157.230.6.213 port 41150:11: Bye Bye [preauth] Jan 15 03:43:02 host sshd[11222]: Disconnected from 157.230.6.213 port 41150 [preauth] Jan 15 03:43:15 host sshd[11348]: Connection closed by 190.138.240.31 port 49108 [preauth] Jan 15 03:43:42 host sshd[11529]: Invalid user bun from 206.189.42.174 port 52434 Jan 15 03:43:42 host sshd[11529]: input_userauth_request: invalid user bun [preauth] Jan 15 03:43:42 host sshd[11529]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:43:42 host sshd[11529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.42.174 Jan 15 03:43:44 host sshd[11529]: Failed password for invalid user bun from 206.189.42.174 port 52434 ssh2 Jan 15 03:43:44 host sshd[11529]: Received disconnect from 206.189.42.174 port 52434:11: Bye Bye [preauth] Jan 15 03:43:44 host sshd[11529]: Disconnected from 206.189.42.174 port 52434 [preauth] Jan 15 03:47:32 host sshd[12484]: Invalid user acowell from 206.189.42.174 port 49072 Jan 15 03:47:32 host sshd[12484]: input_userauth_request: invalid user acowell [preauth] Jan 15 03:47:32 host sshd[12484]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:47:32 host sshd[12484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.42.174 Jan 15 03:47:34 host sshd[12484]: Failed password for invalid user acowell from 206.189.42.174 port 49072 ssh2 Jan 15 03:47:34 host sshd[12484]: Received disconnect from 206.189.42.174 port 49072:11: Bye Bye [preauth] Jan 15 03:47:34 host sshd[12484]: Disconnected from 206.189.42.174 port 49072 [preauth] Jan 15 03:47:46 host sshd[12493]: Invalid user liuyun from 190.138.240.31 port 48080 Jan 15 03:47:46 host sshd[12493]: input_userauth_request: invalid user liuyun [preauth] Jan 15 03:47:46 host sshd[12493]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:47:46 host sshd[12493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.138.240.31 Jan 15 03:47:48 host sshd[12493]: Failed password for invalid user liuyun from 190.138.240.31 port 48080 ssh2 Jan 15 03:47:54 host sshd[12493]: Received disconnect from 190.138.240.31 port 48080:11: Bye Bye [preauth] Jan 15 03:47:54 host sshd[12493]: Disconnected from 190.138.240.31 port 48080 [preauth] Jan 15 03:48:23 host sshd[12667]: Invalid user sunyan from 157.230.6.213 port 32914 Jan 15 03:48:23 host sshd[12667]: input_userauth_request: invalid user sunyan [preauth] Jan 15 03:48:23 host sshd[12667]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:48:23 host sshd[12667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.6.213 Jan 15 03:48:25 host sshd[12667]: Failed password for invalid user sunyan from 157.230.6.213 port 32914 ssh2 Jan 15 03:48:25 host sshd[12667]: Received disconnect from 157.230.6.213 port 32914:11: Bye Bye [preauth] Jan 15 03:48:25 host sshd[12667]: Disconnected from 157.230.6.213 port 32914 [preauth] Jan 15 03:48:52 host sshd[12765]: Invalid user woainia from 206.189.42.174 port 52840 Jan 15 03:48:52 host sshd[12765]: input_userauth_request: invalid user woainia [preauth] Jan 15 03:48:52 host sshd[12765]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:48:52 host sshd[12765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.42.174 Jan 15 03:48:54 host sshd[12765]: Failed password for invalid user woainia from 206.189.42.174 port 52840 ssh2 Jan 15 03:48:54 host sshd[12765]: Received disconnect from 206.189.42.174 port 52840:11: Bye Bye [preauth] Jan 15 03:48:54 host sshd[12765]: Disconnected from 206.189.42.174 port 52840 [preauth] Jan 15 03:49:29 host sshd[12995]: Invalid user tongtong from 157.230.6.213 port 55672 Jan 15 03:49:29 host sshd[12995]: input_userauth_request: invalid user tongtong [preauth] Jan 15 03:49:29 host sshd[12995]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:49:29 host sshd[12995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.6.213 Jan 15 03:49:31 host sshd[12995]: Failed password for invalid user tongtong from 157.230.6.213 port 55672 ssh2 Jan 15 03:49:31 host sshd[12995]: Received disconnect from 157.230.6.213 port 55672:11: Bye Bye [preauth] Jan 15 03:49:31 host sshd[12995]: Disconnected from 157.230.6.213 port 55672 [preauth]